Docker centos:7.7.1908
Vulnerabilities |
56 via 56 paths |
---|---|
Dependencies |
147 |
Source |
Docker |
Target OS |
centos:7 |
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-9.P2.el7
- Fixed in: 32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: centos:7.7.1908@* › bind-license@32:9.11.4-9.P2.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:2344. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade bind-license
to version or higher.
References
high severity
new
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-9.P2.el7
- Fixed in: 32:9.11.4-26.P2.el7_9.4
Detailed paths
-
Introduced through: centos:7.7.1908@* › bind-license@32:9.11.4-9.P2.el7
Overview
Affected versions of this package are vulnerable to RHSA-2021:0671. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade bind-license
to version or higher.
References
high severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-13.el7_6
- Fixed in: 1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: centos:7.7.1908@* › dbus@1:1.10.24-13.el7_6
Overview
Affected versions of this package are vulnerable to RHSA-2020:2894. D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: denial of service via file descriptor leak (CVE-2020-12049) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade dbus
to version or higher.
References
high severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-13.el7_6
- Fixed in: 1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: centos:7.7.1908@* › dbus-libs@1:1.10.24-13.el7_6
Overview
Affected versions of this package are vulnerable to RHSA-2020:2894. D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: denial of service via file descriptor leak (CVE-2020-12049) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade dbus-libs
to version or higher.
References
high severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-4.el7
- Fixed in: 0:3.44.0-7.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss@3.44.0-4.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-5.el7
- Fixed in: 0:3.44.0-8.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-softokn@3.44.0-5.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-5.el7
- Fixed in: 0:3.44.0-8.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-softokn-freebl@3.44.0-5.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-4.el7
- Fixed in: 0:3.44.0-7.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-sysinit@3.44.0-4.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-4.el7
- Fixed in: 0:3.44.0-7.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-tools@3.44.0-4.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-3.el7
- Fixed in: 0:3.44.0-4.el7_7
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-util@3.44.0-3.el7
Overview
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-21.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › openssl-libs@1:1.0.2k-19.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5566. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade openssl-libs
to version or higher.
References
high severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7
- Fixed in: 0:3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: centos:7.7.1908@* › sqlite@3.7.17-8.el7
Overview
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: fts3: improve shadow table corruption detection (CVE-2019-13734) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References
medium severity
- Vulnerable module: bash
- Introduced through: bash@4.2.46-33.el7
- Fixed in: 0:4.2.46-34.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › bash@4.2.46-33.el7
Overview
The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux. Security Fix(es): * bash: BASH_CMD is writable in restricted bash shells (CVE-2019-9924) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-9.P2.el7
- Fixed in: 32:9.11.4-16.P2.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › bind-license@32:9.11.4-9.P2.el7
Overview
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: TCP Pipelining doesn't limit TCP clients on a single connection (CVE-2019-6477) * bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (CVE-2018-5745) * bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable (CVE-2019-6465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-9.P2.el7
- Fixed in: 32:9.11.4-26.P2.el7_9.2
Detailed paths
-
Introduced through: centos:7.7.1908@* › bind-license@32:9.11.4-9.P2.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5011. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622) * bind: remotely triggerable assertion failure in pk11.c (CVE-2020-8623) * bind: incorrect enforcement of update-policy rules of type "subdomain" (CVE-2020-8624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * BIND stops DNSKEY lookup in get_dst_key() when a key with unsupported algorithm is found first [RHEL7] (BZ#1884530)
Remediation
Upgrade bind-license
to version or higher.
References
medium severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
- Fixed in: 0:2.11-28.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › cpio@2.11-27.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3908. The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: improper input validation when writing tar header fields leads to unexpect tar generation (CVE-2019-14866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade cpio
to version or higher.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-54.el7
- Fixed in: 0:7.29.0-59.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › curl@7.29.0-54.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3916. The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade curl
to version or higher.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-54.el7
- Fixed in: 0:7.29.0-59.el7_9.1
Detailed paths
-
Introduced through: centos:7.7.1908@* › curl@7.29.0-54.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5002. The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Incorrect argument check can allow remote servers to overwrite local files (CVE-2020-8177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade curl
to version or higher.
References
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-13.el7_6
- Fixed in: 1:1.10.24-15.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › dbus@1:1.10.24-13.el7_6
Overview
Affected versions of this package are vulnerable to RHSA-2020:4032. D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade dbus
to version or higher.
References
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-13.el7_6
- Fixed in: 1:1.10.24-15.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › dbus-libs@1:1.10.24-13.el7_6
Overview
Affected versions of this package are vulnerable to RHSA-2020:4032. D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade dbus-libs
to version or higher.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-10.el7_3
- Fixed in: 0:2.1.0-11.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › expat@2.1.0-10.el7_3
Overview
Expat is a C library for parsing XML documents. Security Fix(es): * expat: Integer overflow leading to buffer overflow in XML_GetBuffer() (CVE-2015-2716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-10.el7_3
- Fixed in: 0:2.1.0-12.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › expat@2.1.0-10.el7_3
Overview
Affected versions of this package are vulnerable to RHSA-2020:3952. Expat is a C library for parsing XML documents. Security Fix(es): * expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade expat
to version or higher.
References
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
- Fixed in: 0:2.56.1-7.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › glib2@2.56.1-5.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3978. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Security Fix(es): * glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450) * ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade glib2
to version or higher.
References
medium severity
new
- Vulnerable module: glibc
- Introduced through: glibc@2.17-292.el7
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › glibc@2.17-292.el7
Overview
Affected versions of this package are vulnerable to RHSA-2021:0348. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) * glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers (BZ#1883162) * glibc: Performance regression in ebizzy benchmark (BZ#1889977)
Remediation
Upgrade glibc
to version or higher.
References
medium severity
new
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-292.el7
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › glibc-common@2.17-292.el7
Overview
Affected versions of this package are vulnerable to RHSA-2021:0348. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) * glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers (BZ#1883162) * glibc: Performance regression in ebizzy benchmark (BZ#1889977)
Remediation
Upgrade glibc-common
to version or higher.
References
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-37.el7_6
- Fixed in: 0:1.15.1-37.el7_7.2
Detailed paths
-
Introduced through: centos:7.7.1908@* › krb5-libs@1.15.1-37.el7_6
Overview
Affected versions of this package are vulnerable to RHBA-2019:2599. Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). This update fixes the following bug: * KDC and keytab can disagree on kvno after update (BZ#1732743)
Remediation
Upgrade krb5-libs
to version or higher.
References
medium severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-16.el7
- Fixed in: 0:1.42.9-19.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › libcom_err@1.42.9-16.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4011. The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: Crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094) * e2fsprogs: Out-of-bounds write in e2fsck/rehash.c (CVE-2019-5188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade libcom_err
to version or higher.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-54.el7
- Fixed in: 0:7.29.0-59.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › libcurl@7.29.0-54.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3916. The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade libcurl
to version or higher.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-54.el7
- Fixed in: 0:7.29.0-59.el7_9.1
Detailed paths
-
Introduced through: centos:7.7.1908@* › libcurl@7.29.0-54.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5002. The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Incorrect argument check can allow remote servers to overwrite local files (CVE-2020-8177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade libcurl
to version or higher.
References
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
- Fixed in: 0:1.8.0-4.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › libssh2@1.8.0-3.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3915. The libssh2 packages provide a library that implements the SSH2 protocol. Security Fix(es): * libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c (CVE-2019-17498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade libssh2
to version or higher.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7_2.3
- Fixed in: 0:2.9.1-6.el7.4
Detailed paths
-
Introduced through: centos:7.7.1908@* › libxml2@2.9.1-6.el7_2.3
Overview
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131) * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412) * libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035) * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404) * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258) * libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7_2.3
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: centos:7.7.1908@* › libxml2@2.9.1-6.el7_2.3
Overview
Affected versions of this package are vulnerable to RHSA-2020:3996. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) * libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) * libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade libxml2
to version or higher.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7_2.3
- Fixed in: 0:2.9.1-6.el7.4
Detailed paths
-
Introduced through: centos:7.7.1908@* › libxml2-python@2.9.1-6.el7_2.3
Overview
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131) * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412) * libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035) * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404) * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258) * libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7_2.3
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: centos:7.7.1908@* › libxml2-python@2.9.1-6.el7_2.3
Overview
Affected versions of this package are vulnerable to RHSA-2020:3996. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) * libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) * libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade libxml2-python
to version or higher.
References
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nspr@4.21.0-1.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nspr
to version or higher.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-4.el7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss@3.44.0-4.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss
to version or higher.
References
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-5.el7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-softokn@3.44.0-5.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss-softokn
to version or higher.
References
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-5.el7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-softokn-freebl@3.44.0-5.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss-softokn-freebl
to version or higher.
References
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-4.el7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-sysinit@3.44.0-4.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss-sysinit
to version or higher.
References
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-4.el7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-tools@3.44.0-4.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss-tools
to version or higher.
References
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-3.el7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: centos:7.7.1908@* › nss-util@3.44.0-3.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4076. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
Remediation
Upgrade nss-util
to version or higher.
References
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
- Fixed in: 0:2.4.44-22.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › openldap@2.4.44-21.el7_6
Overview
Affected versions of this package are vulnerable to RHSA-2020:4041. OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap packages contain configuration files, libraries, and documentation for OpenLDAP. Security Fix(es): * openldap: denial of service via nested boolean expressions in LDAP search filters (CVE-2020-12243) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade openldap
to version or higher.
References
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-86.el7
- Fixed in: 0:2.7.5-88.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python@2.7.5-86.el7
Overview
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-86.el7
- Fixed in: 0:2.7.5-89.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python@2.7.5-86.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3911. Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade python
to version or higher.
References
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-86.el7
- Fixed in: 0:2.7.5-90.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python@2.7.5-86.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5009. Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade python
to version or higher.
References
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-86.el7
- Fixed in: 0:2.7.5-88.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python-libs@2.7.5-86.el7
Overview
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-86.el7
- Fixed in: 0:2.7.5-89.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python-libs@2.7.5-86.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3911. Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade python-libs
to version or higher.
References
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-86.el7
- Fixed in: 0:2.7.5-90.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › python-libs@2.7.5-86.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:5009. Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Remediation
Upgrade python-libs
to version or higher.
References
medium severity
- Vulnerable module: shared-mime-info
- Introduced through: shared-mime-info@1.8-4.el7
- Fixed in: 0:1.8-5.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › shared-mime-info@1.8-4.el7
Overview
GNOME is the default desktop environment of Red Hat Enterprise Linux. Security Fix(es): * gnome-shell: partial lock screen bypass (CVE-2019-3820) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-54.el7
- Fixed in: 0:7.29.0-57.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › curl@7.29.0-54.el7
Overview
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: TFTP receive heap buffer overflow in tftp_receive_packet() function (CVE-2019-5436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
low severity
- Vulnerable module: file-libs
- Introduced through: file-libs@5.11-35.el7
- Fixed in: 0:5.11-36.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › file-libs@5.11-35.el7
Overview
The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats. Security Fix(es): * file: out-of-bounds read via a crafted ELF file (CVE-2018-10360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-292.el7
- Fixed in: 0:2.17-317.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › glibc@2.17-292.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3861. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade glibc
to version or higher.
References
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-292.el7
- Fixed in: 0:2.17-317.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › glibc-common@2.17-292.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:3861. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade glibc-common
to version or higher.
References
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-54.el7
- Fixed in: 0:7.29.0-57.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › libcurl@7.29.0-54.el7
Overview
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: TFTP receive heap buffer overflow in tftp_receive_packet() function (CVE-2019-5436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
References
low severity
- Vulnerable module: systemd
- Introduced through: systemd@219-67.el7
- Fixed in: 0:219-78.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › systemd@219-67.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4007. The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade systemd
to version or higher.
References
low severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-67.el7
- Fixed in: 0:219-78.el7
Detailed paths
-
Introduced through: centos:7.7.1908@* › systemd-libs@219-67.el7
Overview
Affected versions of this package are vulnerable to RHSA-2020:4007. The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Remediation
Upgrade systemd-libs
to version or higher.