Page tree
Skip to end of metadata
Go to start of metadata

This page shows the package changes from 3.3.3.1 to 3.3.3.2, some for security reasons and the CVEs.

Upgrade to 3.3.3.2 is allowed from 3.3.3.0 and 3.3.3.1.  This page shows only the changes from 3.3.3.1 to 3.3.3.2.


DeliverableName
upgradespectre_update-3.3.3.2.24979-20190806.tgz


CVEs and the new package and RPM that resolves each.

CVE

New RPM

PKG

DESCRIPTION

CVE-2019-12749

dbus-1.2.24-11.el6_10.x86_64

dbus

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVE-2019-12749

dbus-libs-1.2.24-11.el6_10.x86_64

dbus-libs

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVE-2018-11763

httpd24-httpd-2.4.34-7.el6.1.x86_64

httpd24-httpd

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.

CVE-2018-11763

httpd24-httpd-tools-2.4.34-7.el6.1.x86_64

httpd24-httpd-tools

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.

CVE-2018-11763

httpd24-mod_ssl-2.4.34-7.el6.1.x86_64

httpd24-mod_ssl

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.

CVE-2019-0211

httpd24-httpd-2.4.34-7.el6.1.x86_64

httpd24-httpd

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

CVE-2019-0211

httpd24-httpd-tools-2.4.34-7.el6.1.x86_64

httpd24-httpd-tools

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

CVE-2019-0211

httpd24-mod_ssl-2.4.34-7.el6.1.x86_64

httpd24-mod_ssl

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

CVE-2019-11479

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-11479

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-11479

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-11479

perf-2.6.32-754.15.3.el6.x86_64

perf

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2018-12127

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12127

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12127

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12127

perf-2.6.32-754.15.3.el6.x86_64

perf

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-13405

kernel-2.6.32-754.15.3.el6.x86_64

kernel

The inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVE-2018-13405

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

The inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVE-2018-13405

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

The inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVE-2018-13405

perf-2.6.32-754.15.3.el6.x86_64

perf

The inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVE-2018-12130

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12130

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12130

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12130

perf-2.6.32-754.15.3.el6.x86_64

perf

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12126

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12126

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12126

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2018-12126

perf-2.6.32-754.15.3.el6.x86_64

perf

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


CVE-2019-3896

kernel-2.6.32-754.15.3.el6.x86_64

kernel

A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).

CVE-2019-3896

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).

CVE-2019-3896

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).

CVE-2019-3896

perf-2.6.32-754.15.3.el6.x86_64

perf

A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).

CVE-2019-11478

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11478

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11478

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11478

perf-2.6.32-754.15.3.el6.x86_64

perf

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11477

kernel-2.6.32-754.15.3.el6.x86_64

kernel

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVE-2019-11477

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-firmware

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVE-2019-11477

kernel-headers-2.6.32-754.15.3.el6.x86_64

kernel-headers

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVE-2019-11477

perf-2.6.32-754.15.3.el6.x86_64

perf

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVE-2019-3856

libssh2-1.4.2-3.el6_10.1.x86_64

libssh2

An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVE-2019-3857

libssh2-1.4.2-3.el6_10.1.x86_64

libssh2

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVE-2019-3855

libssh2-1.4.2-3.el6_10.1.x86_64

libssh2

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVE-2019-3863

libssh2-1.4.2-3.el6_10.1.x86_64

libssh2

A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.

CVE-2019-9636

python-2.6.6-68.el6_10.x86_64

python

Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly.

CVE-2019-9636

python-libs-2.6.6-68.el6_10.x86_64

python-libs

Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly.

CVE-2019-10160

python-2.6.6-68.el6_10.x86_64

python

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.

CVE-2019-10160

python-libs-2.6.6-68.el6_10.x86_64

python-libs

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.

CVE-2019-12735

vim-common-7.4.629-5.el6_10.2.x86_64

vim-common

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVE-2019-12735

vim-enhanced-7.4.629-5.el6_10.2.x86_64

vim-enhanced

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVE-2019-12735

vim-filesystem-7.4.629-5.el6_10.2.x86_64

vim-filesystem

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVE-2019-12735

vim-minimal-7.4.629-5.el6_10.2.x86_64

vim-minimal

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Packages updated for Security reasons.

Old Package

New Package for CVE

dbus-1.2.24-9.el6.x86_64

dbus-1.2.24-11.el6_10.x86_64

dbus-libs-1.2.24-9.el6.x86_64

dbus-libs-1.2.24-11.el6_10.x86_64

httpd24-httpd-2.4.27-8.el6.1.x86_64

httpd24-httpd-2.4.34-7.el6.1.x86_64

httpd24-httpd-tools-2.4.27-8.el6.1.x86_64

httpd24-httpd-tools-2.4.34-7.el6.1.x86_64

httpd24-libnghttp2-1.7.1-1.el6.x86_64

httpd24-libnghttp2-1.7.1-7.el6.x86_64

httpd24-mod_ssl-2.4.27-8.el6.1.x86_64

httpd24-mod_ssl-2.4.34-7.el6.1.x86_64

httpd24-runtime-1.1-14.el6.x86_64

httpd24-runtime-1.1-18.el6.x86_64

kernel-2.6.32-754.11.1.el6.x86_64

kernel-2.6.32-754.15.3.el6.x86_64

kernel-firmware-2.6.32-754.11.1.el6.noarch

kernel-firmware-2.6.32-754.15.3.el6.noarch

kernel-headers-2.6.32-754.11.1.el6.x86_64

kernel-headers-2.6.32-754.15.3.el6.x86_64

libssh2-1.4.2-2.el6_7.1.x86_64

libssh2-1.4.2-3.el6_10.1.x86_64

microcode_ctl-1.17-33.3.el6_10.x86_64

microcode_ctl-1.17-33.11.el6_10.x86_64

openssl-1.0.1e-48.el6_8.4.x86_64

openssl-1.0.1e-57.el6.x86_64

perf-2.6.32-754.11.1.el6.x86_64

perf-2.6.32-754.15.3.el6.x86_64

python-2.6.6-66.el6_8.x86_64

python-2.6.6-68.el6_10.x86_64

python-libs-2.6.6-66.el6_8.x86_64

python-libs-2.6.6-68.el6_10.x86_64

vim-common-7.4.629-5.el6_8.1.x86_64

vim-common-7.4.629-5.el6_10.2.x86_64

vim-enhanced-7.4.629-5.el6_8.1.x86_64

vim-enhanced-7.4.629-5.el6_10.2.x86_64

vim-filesystem-7.4.629-5.el6_8.1.x86_64

vim-filesystem-7.4.629-5.el6_10.2.x86_64

vim-minimal-7.4.629-5.el6_8.1.x86_64

vim-minimal-7.4.629-5.el6_10.2.x86_64


Packages updated NOT for Security reasons.

Old Package

New Package NOT for CVE

esi-release-3.3.3.1-13910.6.x86_64

esi-release-3.3.3.2-24979.203.x86_64

logbase-ui-3.3.3.1-8462.x86_64

logbase-ui-3.3.3.2-20190805174712.x86_64

lumeta-api-3.3.3.0-13838.x86_64

lumeta-api-3.3.3.2-24972.x86_64

lumeta-api-client-3.3.3.0-13372.x86_64

lumeta-api-client-3.3.3.2-13904.x86_64

lumeta-console-3.3.3.0-13813.x86_64

lumeta-console-3.3.3.2-19864.x86_64

lumeta-diagnostics-3.3.3.0-13532.x86_64

lumeta-diagnostics-3.3.3.2-16420.x86_64

lumeta-discovery-agent-3.3.3.0-13791.x86_64

lumeta-discovery-agent-3.3.3.2-22409.x86_64

lumeta-dxl-3.3.3.1-13229.x86_64

lumeta-dxl-3.3.3.2-13229.x86_64

lumeta-install-3.3.3.1-13792.x86_64

lumeta-install-3.3.3.2-23918.x86_64

lumeta-ireg-3.3.3.1-6550.x86_64

lumeta-ireg-3.3.3.2-6550.x86_64

lumeta-lib-3.3.3.1-13805.x86_64

lumeta-lib-3.3.3.2-19864.x86_64

lumeta-pam-3.3.3.0-13477.x86_64

lumeta-pam-3.3.3.2-17315.x86_64

lumeta-ui-3.3.3.0-13814.x86_64

lumeta-ui-3.3.3.2-20637.x86_64

lumeta-webapp-3.3.3.0-13577.x86_64

lumeta-webapp-3.3.3.2-13903.x86_64

x15-backend-3.3.3.0-13577.x86_64

x15-backend-3.3.3.2-13982.x86_64

x15-clusteradmin-4.16.2-1.x86_64

x15-clusteradmin-4.16.3-1.x86_64

x15-flume-ng-plugin-4.16.2-1.x86_64

x15-flume-ng-plugin-4.16.3-1.x86_64

x15-server-4.16.2-1.x86_64

x15-server-4.16.3-1.x86_64

x15-tools-4.16.2-1.x86_64

x15-tools-4.16.3-1.x86_64


New packages.

New Package NOT for CVE
ndisc6-1.0.2-1.el6.x86_64
  • No labels