Page tree
Skip to end of metadata
Go to start of metadata

Lumeta continually corrects for Common Vulnerabilities & Exposures (CVEs) in our software products. Following is the finalized list of CVEs mitigated in preparation for the release of Lumeta 3.3.3. 

Upgrade to 3.3.3 is allowed from 3.3.1.* and 3.3.2.*.  This page shows only the changes from 3.3.2 to 3.3.3.

DeliverableName
netbootesi-3.3.3-rc8
upgradespectre_update-3.3.3.0.13838-20190513.tgz

CVEs and the new package and RPM that resolves each:

CVE

New RPM

PKG

DESCRIPTION

CVE-2018-10902

kernel-2.6.32-754.11.1.el6.x86_64

kernel

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVE-2018-10902

kernel-firmware-2.6.32-754.11.1.el6.noarch

kernel-firmware

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVE-2018-10902

kernel-headers-2.6.32-754.11.1.el6.x86_64

kernel-headers

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVE-2018-10902

perf-2.6.32-754.11.1.el6.x86_64

perf

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVE-2018-14634

kernel-2.6.32-754.11.1.el6.x86_64

kernel

An integer overflow flaw was found in the Linux kernel'screate_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

CVE-2018-14634

kernel-firmware-2.6.32-754.11.1.el6.noarch

kernel-firmware

An integer overflow flaw was found in the Linux kernel'screate_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

CVE-2018-14634

kernel-headers-2.6.32-754.11.1.el6.x86_64

kernel-headers

An integer overflow flaw was found in the Linux kernel'screate_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

CVE-2018-14634

perf-2.6.32-754.11.1.el6.x86_64

perf

An integer overflow flaw was found in the Linux kernel'screate_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

CVE-2018-5391

kernel-2.6.32-754.11.1.el6.x86_64

kernel

The Linux kernel, versions 3.9+, is vulnerable to a denial of serviceattack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-5391

kernel-firmware-2.6.32-754.11.1.el6.noarch

kernel-firmware

The Linux kernel, versions 3.9+, is vulnerable to a denial of serviceattack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-5391

kernel-headers-2.6.32-754.11.1.el6.x86_64

kernel-headers

The Linux kernel, versions 3.9+, is vulnerable to a denial of serviceattack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-5391

perf-2.6.32-754.11.1.el6.x86_64

perf

The Linux kernel, versions 3.9+, is vulnerable to a denial of serviceattack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-12327

ntp-4.2.6p5-15.el6.centos.x86_64

ntp

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

CVE-2018-12327

ntpdate-4.2.6p5-15.el6.centos.x86_64

ntpdate

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

CVE-2018-12384

nss-3.36.0-9.el6_10.x86_64

nss

**This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

CVE-2018-12384

nss-sysinit-3.36.0-9.el6_10.x86_64

nss-sysinit

**This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

CVE-2018-12384

nss-tools-3.36.0-9.el6_10.x86_64

nss-tools

**This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Packages updated for Security reasons.

Old Package

New Package for CVE

kernel-2.6.32-754.3.5.el6.x86_64

kernel-2.6.32-754.11.1.el6.x86_64

kernel-firmware-2.6.32-754.3.5.el6.noarch

kernel-firmware-2.6.32-754.11.1.el6.noarch

kernel-headers-2.6.32-754.3.5.el6.x86_64

kernel-headers-2.6.32-754.11.1.el6.x86_64

nspr-4.13.1-1.el6.x86_64

nspr-4.19.0-1.el6.x86_64

nss-3.28.4-4.el6_9.x86_64

nss-3.36.0-9.el6_10.x86_64

nss-sysinit-3.28.4-4.el6_9.x86_64

nss-sysinit-3.36.0-9.el6_10.x86_64

nss-tools-3.28.4-4.el6_9.x86_64

nss-tools-3.36.0-9.el6_10.x86_64

nss-util-3.28.4-1.el6_9.x86_64

nss-util-3.36.0-1.el6.x86_64

ntp-4.2.6p5-12.el6.centos.1.x86_64

ntp-4.2.6p5-15.el6.centos.x86_64

ntpdate-4.2.6p5-12.el6.centos.1.x86_64

ntpdate-4.2.6p5-15.el6.centos.x86_64

perf-2.6.32-754.3.5.el6.x86_64

perf-2.6.32-754.11.1.el6.x86_64


Packages updated NOT for Security reasons.

Old Package

New Package NOT for CVE

binutils-2.20.51.0.2-5.43.el6.x86_64

binutils-2.20.51.0.2-5.48.el6_10.1.x86_64

dbus-libs-1.2.24-8.el6_6.x86_64

dbus-libs-1.2.24-9.el6.x86_64

esi-release-3.3.2.0-12332.15.x86_64

esi-release-3.3.3.0-13838.3079.x86_64

jre1.8-1.8.0_181-fcs.x86_64

java-1.8.0-openjdk-headless-1.8.0.201.b09-2.el6_10.x86_64

klish-1.6.1-1.x86_64

klish-2.1.4-1.x86_64

logbase-ui-3.3.2.0-8462.x86_64

logbase-ui-3.3.3.0-8462.x86_64

lumeta-api-3.3.2.0-12332.x86_64

lumeta-api-3.3.3.0-13838.x86_64

lumeta-api-client-3.3.2.0-12304.x86_64

lumeta-api-client-3.3.3.0-13372.x86_64

lumeta-cisco-ise-pxgrid-3.3.2.0-12060.x86_64

lumeta-cisco-ise-pxgrid-3.3.3.0-12060.x86_64

lumeta-console-3.3.2.0-12302.x86_64

lumeta-console-3.3.3.0-13813.x86_64

lumeta-diagnostics-3.3.2.0-12242.x86_64

lumeta-diagnostics-3.3.3.0-13532.x86_64

lumeta-discovery-agent-3.3.2.0-12232.x86_64

lumeta-discovery-agent-3.3.3.0-13791.x86_64

lumeta-dxl-3.3.2.0-12306.x86_64

lumeta-dxl-3.3.3.0-13229.x86_64

lumeta-install-3.3.2.0-12308.x86_64

lumeta-install-3.3.3.0-13792.x86_64

lumeta-ips-import-3.3.2.0-6550.x86_64

lumeta-ips-import-3.3.3.0-6550.x86_64

lumeta-ireg-3.3.2.0-6550.x86_64

lumeta-ireg-3.3.3.0-6550.x86_64

lumeta-jaas-3.3.2.0-11503.x86_64

lumeta-jaas-3.3.3.0-13398.x86_64

lumeta-lib-3.3.2.0-12249.x86_64

lumeta-lib-3.3.3.0-13805.x86_64

lumeta-pam-3.3.2.0-12308.x86_64

lumeta-pam-3.3.3.0-13477.x86_64

lumeta-tfa-3.3.2.0-10659.x86_64

lumeta-tfa-3.3.3.0-10659.x86_64

lumeta-tools-3.3.2.0-10695.x86_64

lumeta-tools-3.3.3.0-10695.x86_64

lumeta-ui-3.3.2.0-12230.x86_64

lumeta-ui-3.3.3.0-13814.x86_64

lumeta-visio-3.3.2.0-12259.x86_64

lumeta-visio-3.3.3.0-12259.x86_64

lumeta-webapp-3.3.2.0-12060.x86_64

lumeta-webapp-3.3.3.0-13577.x86_64

netflow-capture-1.3.6p1-1.x86_64

netflow-capture-1.3.6p1-2.x86_64

openldap-2.4.40-7.el6_7.x86_64

openldap-2.4.40-16.el6.x86_64

rawio-3.3.2.0-8288.x86_64

rawio-3.3.3.0-8288.x86_64

x15-backend-3.3.2.0-10885.x86_64

x15-backend-3.3.3.0-10885.x86_64

x15-clusteradmin-4.2.0-1.x86_64

x15-clusteradmin-4.16.2-1.x86_64

x15-flume-ng-plugin-4.2.0-1.x86_64

x15-flume-ng-plugin-4.16.2-1.x86_64

x15-server-4.2.0-1.x86_64

x15-server-4.16.2-1.x86_64

x15-tools-4.2.0-1.x86_64

x15-tools-4.16.2-1.x86_64

python-psycopg2-2.0.14-2.el6.x86_64

python-psycopg2-2.7.5-1.rhel6.x86_64

python-urlgrabber-3.9.1-9.el6.noarch

python-setuptools-0.6.10-3.el6.noarch

yum-3.2.29-69.el6.centos.noarch

yum-3.2.29-81.el6.centos.0.1.noarch

yum-plugin-fastestmirror-1.1.30-30.el6.noarch

yum-plugin-fastestmirror-1.1.30-42.el6_10.noarch

yum-plugin-tmprepo-1.1.30-30.el6.noarch

yum-plugin-tmprepo-1.1.30-42.el6_10.noarch


New packages.

New Package NOT for CVE

lumeta-crs-3.0.2-1.x86_64

avahi-libs-0.6.25-17.el6.x86_64

collectd-4.10.9-5.el6.x86_64

collectd-postgresql-4.10.9-5.el6.x86_64

dbus-1.2.24-9.el6.x86_64

gnutls-2.12.23-22.el6.x86_64

jpackage-utils-1.7.5-3.16.el6.noarch

krb5-workstation-1.10.3-65.el6.x86_64

libjpeg-turbo-1.2.1-3.el6_5.x86_64

libtalloc-2.0.7-2.el6.x86_64

libtdb-1.3.8-3.el6_8.2.x86_64

libtevent-0.9.18-3.el6.x86_64

libtiff-3.9.4-21.el6_8.x86_64

lksctp-tools-1.0.10-7.el6.x86_64

oddjob-0.30-6.el6.x86_64

oddjob-mkhomedir-0.30-6.el6.x86_64

pam_krb5-2.3.11-9.el6.x86_64

perf-2.6.32-754.11.1.el6.x86_64

pyOpenSSL-0.13.1-2.el6.x86_64

python-bucky-0.2.6-3.el6.noarch

python-carbon-0.9.16-1.el6.noarch

python-twisted-core-8.2.0-4.el6.x86_64

python-urlgrabber-3.9.1-11.el6.noarch

python-whisper-0.9.16-1.el6.noarch

python-zope-filesystem-1-5.el6.x86_64

python-zope-interface-3.5.2-2.1.el6.x86_64

samba-3.6.23-51.el6.x86_64

samba-common-3.6.23-51.el6.x86_64

samba-winbind-3.6.23-51.el6.x86_64

samba-winbind-clients-3.6.23-51.el6.x86_64

tzdata-java-2019a-1.el6.noarch

yajl-1.0.7-3.el6.x86_64


Deleted packages.

Deleted Package

cryptsetup-luks-1.2.0-11.el6.x86_64

cryptsetup-luks-libs-1.2.0-11.el6.x86_64



  • No labels