Tuxcare Errata System
0.0.1
5.10
2024-03-27T18:18:39
Fix CVE-2021-3156: Heap-based buffer overflow in sudo
Community Enterprise Operating System 6
Fix CVE-2021-3156: Heap-based buffer overflow in sudo.
Important
TuxCare License Agreement
CVE-2021-3156
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-23240
Community Enterprise Operating System 6
- sudo-1.8.6p3-CVE-2021-23240-2.patch: fixed issue with credentials management in sudoedit
- sudo-1.8.6p3-CVE-2021-23240-3.patch: fixed issue with origin file removal in sesh
Important
TuxCare License Agreement
CVE-2021-23240
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2019-18276
Community Enterprise Operating System 6
- CVE-2019-18276: Fix priviledge dropping when running with effective
UID not equal to real UID
Important
TuxCare License Agreement
CVE-2019-18276
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-1271 in gzip
Community Enterprise Operating System 6
- CVE-2022-1271: Fix arbitrary file override with crafted file names
Low
TuxCare License Agreement
CVE-2022-1271
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-8625
Community Enterprise Operating System 6
- Fix buffer overflow in the SPNEGO implementation affecting GSSAPI security
policy negotiation (CVE-2020-8625)
Important
TuxCare License Agreement
CVE-2020-8625
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-25215, CVE-2021-25214, CVE-2021-25216
Community Enterprise Operating System 6
- A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214)
- An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215)
- A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack (CVE-2021-25216)
Critical
TuxCare License Agreement
CVE-2021-25215
CVE-2021-25214
CVE-2021-25216
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-25219
Community Enterprise Operating System 6
- CVE-2021-25219: Fix resolver performance degradation via lame cache abuse
Moderate
TuxCare License Agreement
CVE-2021-25219
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-25220
Community Enterprise Operating System 6
- CVE-2021-25220: fix possible cache poisoning from forwarder responses
Important
TuxCare License Agreement
CVE-2021-25220
cpe:/o:centos:linux:6:GA
Fixed CVE-2018-5741 in bind
Community Enterprise Operating System 6
- CVE-2018-5741: update {krb5,ms}-{self,subdomain} descriptions
Moderate
TuxCare License Agreement
CVE-2018-5741
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-28391
Community Enterprise Operating System 6
- CVE-2022-28391: fix possible terminal injection attacks from DNS query results
Critical
TuxCare License Agreement
CVE-2022-28391
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-35452
Community Enterprise Operating System 6
- CVE-2020-35452: fix stack overflow in mod_auth_digest due to
crafted digest nonce
Important
TuxCare License Agreement
CVE-2020-35452
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-39275
Community Enterprise Operating System 6
- CVE-2021-39275: ap_escape_quotes() algorithm which led to
buffer overflow.
Critical
TuxCare License Agreement
CVE-2021-39275
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-22721, CVE-2022-22720
Community Enterprise Operating System 6
- CVE-2022-22720: simpler connection close logic if discarding the request body fails
- CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory
Critical
TuxCare License Agreement
CVE-2022-22721
CVE-2022-22720
cpe:/o:centos:linux:6:GA
Fixed CVEs in httpd: CVE-2022-31813, CVE-2022-28615, CVE-2022-26377
Community Enterprise Operating System 6
- CVE-2022-26377: mod_proxy_ajp: fix HTTP request smuggling
- CVE-2022-28615: fix possible out-of-bounds read in ap_strcmp_match()
- CVE-2022-31813: mod_proxy: preserve original request headers so an upstream knows what
the original request hostname was, and so send X-Forwarded-* headers correctly
Critical
TuxCare License Agreement
CVE-2022-31813
CVE-2022-26377
CVE-2022-28615
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-8284
Community Enterprise Operating System 6
- trusting FTP PASV responses (CVE-2020-8284)
Low
TuxCare License Agreement
CVE-2020-8284
cpe:/o:centos:linux:6:GA
Fix of CVE-2021-22876
Community Enterprise Operating System 6
- back-port urlapi from v7.75.0 (used by CVE-2021-22876)
- strip credentials from the auto-referer header (CVE-2021-22876)
Moderate
TuxCare License Agreement
CVE-2021-22876
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-22898
Community Enterprise Operating System 6
- check sscanf() for correct number of matches (CVE-2021-22898)
Low
TuxCare License Agreement
CVE-2021-22898
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-22925
Community Enterprise Operating System 6
- telnet stack contents disclosure again (CVE-2021-22925)
Moderate
TuxCare License Agreement
CVE-2021-22925
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-22924
Community Enterprise Operating System 6
- fix connection reuse checks for issuer cert and case sensitivity (CVE-2021-22924)
Low
TuxCare License Agreement
CVE-2021-22924
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-27782 in curl
Community Enterprise Operating System 6
- CVE-2022-27782: add missing checks of ssl and ssh options during matching
a connection for reuse
Important
TuxCare License Agreement
CVE-2022-27782
cpe:/o:centos:linux:6:GA
Fixed CVE-2021-33582 in cyrus-imapd
Community Enterprise Operating System 6
- CVE-2021-33582: Fix a bad string hashing algorithm which could lead to
collisions and cause a CPU denial of service
Important
TuxCare License Agreement
CVE-2021-33582
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-25217
Community Enterprise Operating System 6
- CVE-2021-25217: avoid buffer overrun
Important
TuxCare License Agreement
CVE-2021-25217
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-25275, CVE-2020-12100
Community Enterprise Operating System 6
- CVE-2020-12100: Resource exhaustion via deeply nested MIME parts
- CVE-2020-25275: Denial of service via mail MIME parsing
Important
TuxCare License Agreement
CVE-2020-12100
CVE-2020-25275
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2017-6363, CVE-2021-40145
Community Enterprise Operating System 6
- CVE-2021-40145: check for memory allocation errors processing GD2 images
- CVE-2017-6363: make sure transparent index is within bounds of the palette
Important
TuxCare License Agreement
CVE-2021-40145
CVE-2017-6363
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-28153
Community Enterprise Operating System 6
- Fixed CVE-2021-28153: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION
creates empty target for dangling symlink
Important
TuxCare License Agreement
CVE-2021-27219
CVE-2021-28153
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3800
Community Enterprise Operating System 6
- CVE-2021-3800: Fix privilege escalation
Low
TuxCare License Agreement
CVE-2021-3800
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-33574, CVE-2021-35942, CVE-2021-38604
Community Enterprise Operating System 6
- Adopt pthread_attr_copy functionality, test case is included
- CVE-2021-33574: avoid use-after-free vulnerability
- CVE-2021-35942: avoid out-of-bounds read via
signed integer overflow in array index
- CVE-2021-38604: considered. No NULL pointer dereference is possible
Critical
TuxCare License Agreement
CVE-2021-33574
CVE-2021-38604
CVE-2021-35942
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3326, CVE-2021-43396
Community Enterprise Operating System 6
- CVE-2021-3326: avoid denial of service due to a failed assertion
- CVE-2021-43396: check actual stored character in state reset code
Important
TuxCare License Agreement
CVE-2021-43396
CVE-2021-3326
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-23218, CVE-2022-23219
Community Enterprise Operating System 6
- CVE-2022-23218: fix possible buffer overflow in svcunix_create
- CVE-2022-23219: fix possible buffer overflow in clnt_create
Critical
TuxCare License Agreement
CVE-2022-23218
CVE-2022-23219
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3999
Community Enterprise Operating System 6
- CVE-2021-3999: fix single byte buffer overflow and overflow in getcwd
Low
TuxCare License Agreement
CVE-2021-3999
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3504
Community Enterprise Operating System 6
- Bounds check for block exceeding page length (CVE-2021-3504)
resolves: rhbz#1950500
Moderate
TuxCare License Agreement
CVE-2021-3504
cpe:/o:centos:linux:6:GA
Fix of 13 CVEs
Community Enterprise Operating System 6
- CKSIX-267: USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CKSIX-267: CVE-2019-14615: drm/i915/gen9: Clear residual context state on context switch
- CKSIX-267: CVE-2020-8647, CVE-2020-8649: vgacon: Fix a UAF in vgacon_invert_region
- CKSIX-267: CVE-2020-14331: vgacon: Fix for missing check in scrollback handling
- CKSIX-268: CVE-2021-3347: futex: Handle faults correctly for PI futexes
- CKSIX-268: CVE-2021-3347: futex: Provide and use pi_state_update_owner()
- CKSIX-263: KEYS: allow reaching the keys quotas exactly
- CKSIX-263: KEYS: reaching the keys quotas correctly
- CKSIX-263: fix -ENOMEM result with invalid user space pointer in sendto() syscall
- CKSIX-263: CVE-2017-18344: posix-timer: Properly check sigevent->sigev_notify
- CKSIX-263: CVE-2018-6927: futex: Prevent overflow by strengthen input validation
- CKSIX-258: CVE-2017-6951: KEYS: Change the name of the dead type to ".dead" to prevent user access
- CKSIX-258: CVE-2017-15299: KEYS: don't let add_key() update an uninstantiated key
- CKSIX-258: fix CVE-2016-9604
- CKSIX-258: KEYS: add missing permission check for request_key() destination
- CKSIX-258: CVE-2017-10661: timerfd: Protect the might cancel mechanism proper
- CKSIX-258: fix CVE-2017-7472
- CKSIX-258: fix CVE-2017-15274
Important
TuxCare License Agreement
CVE-2021-3347
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-27364, CVE-2021-27363, CVE-2021-27365
Community Enterprise Operating System 6
- CVE-2021-27365: scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE-2021-27365: scsi: iscsi: Verify lengths on passthrough PDUs
- CVE-2021-27363: CVE-2021-27364: scsi: iscsi: Restrict sessions and handles to admin capabilities
- sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
Important
TuxCare License Agreement
CVE-2021-27364
CVE-2021-27363
CVE-2021-27365
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-29661, CVE-2019-19532, CVE-2020-25656, CVE-2020-25211
Community Enterprise Operating System 6
- CKSIX-277: CVE-2020-29661: tty: Fix ->pgrp locking in tiocspgrp()
- CKSIX-277: CVE-2020-25656: vt: keyboard, extend func_buf_lock to readers
- CKSIX-277: CVE-2020-25656: tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CKSIX-277: CVE-2020-25656: vt: keyboard, simplify vt_kdgkbsent
- CKSIX-277: CVE-2020-25211: netfilter: ctnetlink: add a range check for l3/l4 protonum
- CKSIX-277: CKSIX-276: CVE-2019-19532: HID: Fix assumption that devices have inputs
Important
TuxCare License Agreement
CVE-2020-29661
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-22555
Community Enterprise Operating System 6
- ELS-130: CVE-2021-22555: netfilter: x_tables: fix compat match/target pad out-of-bound write
Important
TuxCare License Agreement
CVE-2021-22555
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-33909
Community Enterprise Operating System 6
- ELS-130: netfilter: x_tables: add missing tables zeroing
- CLKRN-800: CVE-2021-33909: seq_file: disallow extremely large seq buffer allocation
Important
TuxCare License Agreement
CVE-2021-33909
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-38160, CVE-2021-3573, CVE-2021-38205, CVE-2021-3178, CVE-2021-20265, CVE-2021-3612, CVE-2021-32399, CVE-2021-37159, CVE-2014-4508, CVE-2021-28972, CVE-2021-34693, CVE-2021-20292
Community Enterprise Operating System 6
- ELSCVE-666: CVE-2021-34693: can: bcm: fix infoleak in struct bcm_msg_head
- ELSCVE-705: CVE-2021-38160: virtio_console: Assure used length from device is limited
- ELSCVE-769: CVE-2014-4508: x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
- ELSCVE-844: CVE-2021-3573: Bluetooth: use correct lock to prevent UAF of hdev object
- ELSCVE-503: CVE-2021-32399: bluetooth: eliminate the potential race condition when removing the HCI controller
- ELSCVE-451: CVE-2021-37159: hso: fix a use after free condition
- ELSCVE-387: CVE-2021-38205: net: xilinx_emaclite: Do not print real IOMEM pointer
- ELSCVE-547: CVE-2021-3178: nfsd4: readdirplus shouldn't return parent of export
- ELSCVE-547: nfsd: fix compose_entry_fh() failure exits
- ELSCVE-547: nfsd: make local functions static
- ELSCVE-682: CVE-2021-20265: af_unix: fix struct pid memory leak
- ELSCVE-531: CVE-2021-20292: drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- ELSCVE-543: CVE-2021-28972: PCI: rpadlpar: Fix potential drc_name corruption in store functions
- ELSCVE-575: CVE-2021-3612: Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl
- ELSCVE-575: Input: joydev - prevent potential read overflow in ioctl
- ELSCVE-575: Input: joydev - fix possible ERR_PTR() dereferencing
- ELSCVE-575: Input: joydev - use memdup_user() to duplicate memory from user-space
Important
TuxCare License Agreement
CVE-2021-28972
CVE-2014-4508
CVE-2021-3612
CVE-2021-3178
CVE-2021-38205
CVE-2021-20265
CVE-2021-38160
CVE-2021-37159
CVE-2021-32399
CVE-2021-20292
CVE-2021-34693
CVE-2021-3573
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-0920, CVE-2022-0492, CVE-2020-0466, CVE-2021-4155
Community Enterprise Operating System 6
- cgroup-v1: Require capabilities to set release_agent [ELSCVE-3555] {CVE-2022-0492}
- xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [ELSCVE-3891] {CVE-2021-4155}
- af_unix: fix garbage collect vs MSG_PEEK [ELSCVE-3728] {CVE-2021-0920}
- epoll: Keep a reference on files added to the check list [ELSCVE-3890] {CVE-2020-0466}
- Revert "cipso,calipso: resolve a number of problems with the DOI refcounts"
Important
TuxCare License Agreement
CVE-2021-0920
CVE-2020-0466
CVE-2021-4155
CVE-2022-0492
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-28390, CVE-2021-3609
Community Enterprise Operating System 6
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path [ELSCVE-3847] {CVE-2022-28390}
- can: bcm: delay release of struct bcm_op after synchronize_rcu() [ELSCVE-1694] {CVE-2021-3609}
- RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy [ELSCVE-2286] {CVE-2020-36385}
- RDMA/ucma: Fix the locking of ctx->file [ELSCVE-2286] {CVE-2020-36385}
- RDMA/cma: Add missing locking to rdma_accept() [ELSCVE-2286] {CVE-2020-36385}
- RDMA/ucma: Put a lock around every call to the rdma_cm layer [ELSCVE-2286] {CVE-2020-36385}
- sctp: validate chunk size in __rcv_asconf_lookup [ELSCVE-713] {CVE-2021-3655}
- sctp: fix return value check in __sctp_rcv_asconf_lookup [ELSCVE-713] {CVE-2021-3655}
- add size validation when walking chunks [ELSCVE-713] {CVE-2021-3655}
- sctp: validate from_addr_param return [ELSCVE-713] {CVE-2021-3655}
- sctp: fully initialize v4 addr in some functions [ELSCVE-713] {CVE-2021-3655}
- sctp: simplify addr copy [ELSCVE-713] {CVE-2021-3655}
- dm ioctl: fix out of bounds array access when no devices [ELSCVE-475] {CVE-2021-31916}
Important
TuxCare License Agreement
CVE-2021-3655
CVE-2022-28390
CVE-2020-36385
CVE-2021-4083
CVE-2021-3609
CVE-2021-31916
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-24407
Community Enterprise Operating System 6
- CVE-2022-24407: Fix failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
Important
TuxCare License Agreement
CVE-2022-24407
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-4104
Community Enterprise Operating System 6
- CVE-2021-4104: Fix remote code execution vulnerability
Important
TuxCare License Agreement
CVE-2021-4104
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-23305
Community Enterprise Operating System 6
- CVE-2022-23305: disable JDBCAppender by default. Add optional parameter for
enabling it.
Critical
TuxCare License Agreement
CVE-2022-23305
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-23307, CVE-2022-23302
Community Enterprise Operating System 6
- CVE-2022-23307: Fix Unsafe deserialization flaw in Chainsaw log viewer
- CVE-2022-23302: Fix remote code execution when application is configured to use JMSSink
Important
TuxCare License Agreement
CVE-2022-23307
CVE-2022-23302
cpe:/o:centos:linux:6:GA
Fixed CVE-2019-17571 in log4j
Community Enterprise Operating System 6
- CVE-2019-17571: Fix the deserialization of untrusted data in SocketServer
that allows an attacker to remotely execute arbitrary code
Critical
TuxCare License Agreement
CVE-2019-17571
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-23017
Community Enterprise Operating System 6
- Update fix for CVE-2021-23017 accoding nginx.org recomendations
Critical
TuxCare License Agreement
CVE-2021-23017
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2017-20005
Community Enterprise Operating System 6
- CVE-2017-20005: fix buffer overflow for years that exceed four digits
Critical
TuxCare License Agreement
CVE-2017-20005
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3618
Community Enterprise Operating System 6
- CVE-2021-3618: drop the connection after reaching the specified number of
invalid protocol commmands
Important
TuxCare License Agreement
CVE-2021-3618
cpe:/o:centos:linux:6:GA
Fixed CVE-2016-10009 in openssh-5.3p1
Community Enterprise Operating System 6
- CVE-2016-10009: add whitelist of paths which may ssh-agent load from
in order to prevent execution of arbitrary local pkcs#11
Important
TuxCare License Agreement
CVE-2016-10009
cpe:/o:centos:linux:6:GA
Fixed CVEs in openssh-5.3p1: CVE-2016-10708, CVE-2016-10012
Community Enterprise Operating System 6
- CVE-2016-10708: fix crash in packet handling code by moving inbound NEWKEYS
handling to kex layer
- CVE-2016-10012: abandon the fix due to compression mode issues
Important
TuxCare License Agreement
CVE-2016-10708
cpe:/o:centos:linux:6:GA
Fixed CVE-2016-10012 in openssh
Community Enterprise Operating System 6
- CVE-2016-10012: re-remove pre-authentication compression and potentially
unsecure shared memory manager used by zlib
- Move not yet valid timestamps for certs to 2030-2040 range, make sure all
tests are passed and add %check
unset DISPLAY
section
Important
TuxCare License Agreement
CVE-2016-10012
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-11868
Community Enterprise Operating System 6
- CVE-2020-11868: incorrect handling of packets from unauthenticated
synchronization source with spoofed IP address leads to denial of service.
Important
TuxCare License Agreement
CVE-2013-5211
CVE-2020-11868
cpe:/o:centos:linux:6:GA
Fix CVE: CVE-2020-1971
Community Enterprise Operating System 6
EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)
Moderate
TuxCare License Agreement
CVE-2020-1971
cpe:/o:centos:linux:6:GA
Fix of CVE:CVE-2021-23841
Community Enterprise Operating System 6
- Fix Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
Moderate
TuxCare License Agreement
CVE-2021-23841
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-23840
Community Enterprise Operating System 6
- Fixed integer overflow in CipherUpdate(CVE-2021-23840)
Important
TuxCare License Agreement
CVE-2021-23840
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2018-0739, CVE-2018-0737, CVE-2021-3712, CVE-2018-0732
Community Enterprise Operating System 6
- fix CVE-2021-3712 - handling ASN.1 string as NULL
terminated leads to read buffer overrun
- Port patches from oracle6els branch, original changelog entry:
- Oracle bug 28730228: backport CVE-2018-0732
- Oracle bug 28758493: backport CVE-2018-0737
- Merge upstream patch to fix CVE-2018-0739
- Avoid out-of-bounds read. Fixes CVE 2017-3735. By Rich Salz
- sha256 is used for the RSA pairwise consistency test instead of sha1
Important
TuxCare License Agreement
CVE-2017-3735
CVE-2021-3712
CVE-2018-0732
CVE-2018-0739
CVE-2018-0737
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0778
Community Enterprise Operating System 6
- CVE-2022-0778: Fix possible infinite loop in BN_mod_sqrt()
Important
TuxCare License Agreement
CVE-2022-0778
cpe:/o:centos:linux:6:GA
Fixed CVEs in openssl: CVE-2022-2068, CVE-2022-1292
Community Enterprise Operating System 6
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
Critical
TuxCare License Agreement
CVE-2022-1292
CVE-2022-2068
cpe:/o:centos:linux:6:GA
Fixed CVE-2020-12723 in perl-5.10.1
Community Enterprise Operating System 6
- CVE-2020-12723: fix a buffer overflow caused by a crafted regular expression
because of recursive S_study_chunk calls
Important
TuxCare License Agreement
CVE-2020-12723
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-10878
Community Enterprise Operating System 6
- CVE-2020-10878: fix integer overflow leading to RCE
Important
TuxCare License Agreement
CVE-2020-10878
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-10543
Community Enterprise Operating System 6
- CVE-2020-10543: fix signed integer overflow leading to heap buffer overrun
Important
TuxCare License Agreement
CVE-2020-10543
cpe:/o:centos:linux:6:GA
Security fix for CVE-2019-10160
Community Enterprise Operating System 6
- Security fix for CVE-2019-10160
Resolves: rhbz#1716744
Critical
TuxCare License Agreement
CVE-2019-10160
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-26116, CVE-2020-8492, CVE-2018-20852, CVE-2020-27619
Community Enterprise Operating System 6
- Add Oracle Linux distribution in platform.py
- CVE-2018-20852: Prefix dot in domain for proper subdomain validation
- CVE-2020-8492: Python allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client
- CVE-2020-26116: http.client allows CRLF injection if the attacker controls the HTTP request method
- CVE-2020-27619: Unsafe use of eval() on data retrieved via HTTP in the test suite
Critical
TuxCare License Agreement
CVE-2020-8492
CVE-2020-27619
CVE-2020-26116
CVE-2018-20852
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0391
Community Enterprise Operating System 6
- CVE-2022-0391: Add stripping ASCII newline and tabs from the url by urllib.parse
Important
TuxCare License Agreement
CVE-2022-0391
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3737
Community Enterprise Operating System 6
- CVE-2021-3737: Fix HTTP client infinite line reading (DoS) after receiving a '100 Continue' HTTP response
Important
TuxCare License Agreement
CVE-2021-3737
cpe:/o:centos:linux:6:GA
Fixed CVE-2015-20170 in python
Community Enterprise Operating System 6
- CVE-2015-20170: mailcap: findmatch() function does not sanitise the second
argument allowing to inject shell commands
Critical
TuxCare License Agreement
CVE-2015-20107
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-21704, CVE-2021-21703, CVE-2021-21705
Community Enterprise Operating System 6
- CVE-2021-21704: fix integer overflow and subsequent incorrect buffer allocation
- CVE-2021-21705: fix incorrect url password validation
- CVE-2021-21703: fix incorrect shared memory management, which led to priv escalation
Important
TuxCare License Agreement
CVE-2021-21703
CVE-2021-21705
CVE-2021-21704
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-31625 in php
Community Enterprise Operating System 6
- ELS-189: Fix for Harden PHP
- CVE-2022-31625: Fix freeing of uninitialized memory leading to RCE
Critical
TuxCare License Agreement
CVE-2022-31625
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-44038
Community Enterprise Operating System 6
- CVE-2021-44038: low privilege escalation during package installation/update due to
insecure chmod in spec file.
Important
TuxCare License Agreement
CVE-2021-44038
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-43527
Community Enterprise Operating System 6
- CVE-2021-43527: Fix memory corruption in decodeECorDsaSignature with DSA
signatures (and RSA-PSS)
- Update to CKBI 2.50 from NSS 3.67
- Removing:
- # Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
- # Certificate "AddTrust Low-Value Services Root"
- # Certificate "AddTrust External Root"
- # Certificate "GeoTrust Global CA"
- # Certificate "GeoTrust Universal CA"
- # Certificate "GeoTrust Universal CA 2"
- # Certificate "QuoVadis Root CA"
- # Certificate "Sonera Class 2 Root CA"
- # Certificate "UTN USERFirst Email Root CA"
- # Certificate "Taiwan GRCA"
- # Certificate "Certplus Class 2 Primary CA"
- # Certificate "GeoTrust Primary Certification Authority"
- # Certificate "thawte Primary Root CA"
- # Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
- # Certificate "Deutsche Telekom Root CA 2"
- # Certificate "GeoTrust Primary Certification Authority - G3"
- # Certificate "thawte Primary Root CA - G2"
- # Certificate "thawte Primary Root CA - G3"
- # Certificate "GeoTrust Primary Certification Authority - G2"
- # Certificate "VeriSign Universal Root Certification Authority"
- # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
- # Certificate "Staat der Nederlanden Root CA - G2"
- # Certificate "Trustis FPS Root CA"
- # Certificate "EE Certification Centre Root CA"
- # Certificate "Swisscom Root CA 2"
- # Certificate "Certinomis - Root CA"
- # Certificate "LuxTrust Global Root 2"
- # Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
- # Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
- Adding:
- # Certificate "Entrust Root Certification Authority - G4"
- # Certificate "Microsoft ECC Root Certificate Authority 2017"
- # Certificate "Microsoft RSA Root Certificate Authority 2017"
- # Certificate "e-Szigno Root CA 2017"
- # Certificate "certSIGN Root CA G2"
- # Certificate "Trustwave Global Certification Authority"
- # Certificate "Trustwave Global ECC P256 Certification Authority"
- # Certificate "Trustwave Global ECC P384 Certification Authority"
- # Certificate "NAVER Global Root Certification Authority"
- # Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
- # Certificate "GlobalSign Secure Mail Root R45"
- # Certificate "GlobalSign Secure Mail Root E45"
- # Certificate "GlobalSign Root R46"
- # Certificate "GlobalSign Root E46"
- # Certificate "GLOBALTRUST 2020"
- # Certificate "ANF Secure Server Root CA"
- # Certificate "Certum EC-384 CA"
- # Certificate "Certum Trusted Root CA"
- revert last change. Patch was for nss-softokn
- Fix out-of-bounds write in NSC_EncryptUpdate (#1775909)
Critical
TuxCare License Agreement
CVE-2021-43527
cpe:/o:centos:linux:6:GA
Fix of 8 CVEs
Community Enterprise Operating System 6
- CVE-2021-3517.patch: validate UTF8 in xmlEncodeEntities
- CVE-2021-3518.patch: fix user-after-free with 'xmllint --xinclude --dropdtd'
- CVE-2021-3537.patch: propagate error in xmlParseElementChildrenContentDeclPriv
- CVE-2021-3541.patch: parser fix for the billion laughs attack
- CVE-2021-3516.patch: fix use-after-free with 'xmllint --html --push'
- CVE-2017-8872.patch: free input buffer in xmlHaltParser
- CVE-2019-20388.patch: fix memory leak in xmlSchemaValidateStream
- CVE-2020-24977.patch: fix out-of-bounds read with 'xmllint --htmlout'
Critical
TuxCare License Agreement
CVE-2021-3516
CVE-2021-3517
CVE-2021-3537
CVE-2021-3541
CVE-2017-8872
CVE-2020-24977
CVE-2019-20388
CVE-2021-3518
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-23308
Community Enterprise Operating System 6
- CVE-2022-23308: fix use-after-free of ID and IDREF attributes
Important
TuxCare License Agreement
CVE-2022-23308
cpe:/o:centos:linux:6:GA
Fixed CVE-2018-25032 in rsync
Community Enterprise Operating System 6
- CVE-2018-25032: Fix memory corruption when deflating if the input
has many distant matches
Important
TuxCare License Agreement
CVE-2018-25032
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-24903 in rsyslog
Community Enterprise Operating System 6
- CVE-2022-24903: fix heap-based overflow in TCP syslog server
Important
TuxCare License Agreement
CVE-2022-24903
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0943
Community Enterprise Operating System 6
- CVE-2022-0943: fix heap-based buffer overflow
Important
TuxCare License Agreement
CVE-2022-0943
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-1154
Community Enterprise Operating System 6
- CVE-2022-1154: fix buffer usage after free
Critical
TuxCare License Agreement
CVE-2022-1154
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-1620, CVE-2022-1616, CVE-2022-1629, CVE-2022-1621, CVE-2022-1619
Community Enterprise Operating System 6
- CVE-2022-1619: fix going before the command line start with latin1 encoding
- CVE-2022-1620: fix NULL pointer dereference when using invalig regexp
- CVE-2022-1621: fix to avoid adding invalid bytes with :spellgood
- CVE-2022-1629: fix reading past end of line if ended with trailing backslash
- CVE-2022-1616: fix buffer overflow with invalid command with composing chars
Important
TuxCare License Agreement
CVE-2022-1621
CVE-2022-1619
CVE-2022-1620
CVE-2022-1629
CVE-2022-1616
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-1733, CVE-2022-1735
Community Enterprise Operating System 6
- CVE-2022-1733: fix reading past end of the line when C-indenting
- CVE-2022-1735: fix invalid memory access caused by changing text in Visual mode
Important
TuxCare License Agreement
CVE-2022-1735
CVE-2022-1733
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-1796, CVE-2022-1785
Community Enterprise Operating System 6
- CVE-2022-1785: fix out-of-bounds write by disallowing changing window
in substitute expression
- CVE-2022-1796: fix use after free by making a copy of a line
Important
TuxCare License Agreement
CVE-2022-1785
CVE-2022-1796
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-1886, CVE-2022-0319, CVE-2022-1898, CVE-2022-1851
Community Enterprise Operating System 6
- CVE-2022-0319: correct end of Visual area when entering another buffer
- CVE-2022-1851: fix invalid cursor position after text formatting
- CVE-2022-1886: fix access before start of text with a put command
- CVE-2022-1898: fix using freed memory with ']d'
Important
TuxCare License Agreement
CVE-2022-1898
CVE-2022-1851
CVE-2022-0319
CVE-2022-1886
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-1897, CVE-2022-1927
Community Enterprise Operating System 6
- CVE-2022-1897: fix substitution which overwrites an allocated buffer
- CVE-2022-1927: fix invalid cursor position after '0;' range
Critical
TuxCare License Agreement
CVE-2022-1927
CVE-2022-1897
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-2042 in vim
Community Enterprise Operating System 6
- CVE-2022-2042: fix using uninitialized value and freed memory in spell command
Critical
TuxCare License Agreement
CVE-2022-1942
CVE-2022-1968
CVE-2022-2000
CVE-2022-2042
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-1720, CVE-2022-2129
Community Enterprise Operating System 6
- CVE-2022-2125: add checking for NUL to avoid running over the end of line
- CVE-2022-1720: do not include the NUL in the length to avoid reading past end
of line with "gf" in Visual block mode
- CVE-2022-2124: add checking for NUL to avoid running over the end of line
- CVE-2022-2129: disallow switching buffers in a substitute expression to avoid
overruning destination buffer
- CVE-2022-2126: do not decrement the index when it is zero
Important
TuxCare License Agreement
CVE-2022-2125
CVE-2022-2126
CVE-2022-1720
CVE-2022-2129
CVE-2022-2124
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-2182, CVE-2022-2210, CVE-2022-2207, CVE-2022-2183
Community Enterprise Operating System 6
- CVE-2022-2182: when on line zero check the column is valid for line one
- CVE-2022-2183: avoid going over the NUL at the end of the line
- CVE-2022-2207: check the cursor column is more than zero
- CVE-2022-2210: use zero offset when change removes all lines in a diff block.
Critical
TuxCare License Agreement
CVE-2022-2182
CVE-2022-2175
CVE-2022-2207
CVE-2022-2210
CVE-2022-2183
cpe:/o:centos:linux:6:GA
Fixed 7 CVEs in vim
Community Enterprise Operating System 6
- CVE-2022-2206: adjust cmdline_row and msg_row to the value of Rows
- CVE-2022-2284: stop visual mode when closing a window
- CVE-2022-2285: put a NUL after the typeahead
- CVE-2022-2286: check the length of the string
- CVE-2022-2287: disallow adding a word with control characters or a trailing slash
- CVE-2022-2264: adjust the end mark position
- CVE-2022-2257: check for NUL on string special values parsing
Important
TuxCare License Agreement
CVE-2022-2264
CVE-2022-2206
CVE-2022-2285
CVE-2022-2286
CVE-2022-2257
CVE-2022-2284
CVE-2022-2287
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3928, CVE-2021-3927
Community Enterprise Operating System 6
- CVE-2021-3927: fix heap-based buffer overflow when reading character past end of line
- CVE-2021-3928: fix stack-based buffer overflow when reading uninitialized memory when giving spell suggestions
Important
TuxCare License Agreement
CVE-2021-3927
CVE-2021-3928
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3973, CVE-2021-3974, CVE-2021-4019, CVE-2021-4069, CVE-2021-3984
Community Enterprise Operating System 6
- CVE-2021-3974: fix using freed memory with regexp using a mark
- CVE-2021-3984: fix illegal memory access when C-indenting
- CVE-2021-3973: fix crash when using CTRL-W f without finding a file name
- CVE-2021-4019: fix buffer overflow with long help argument
- CVE-2021-4069: fix using freed memory in open command
Important
TuxCare License Agreement
CVE-2021-3974
CVE-2021-4019
CVE-2021-3984
CVE-2021-4069
CVE-2021-3973
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-4192, CVE-2021-4193
Community Enterprise Operating System 6
- CVE-2021-4192: fix using freed memory in /\%V
- CVE-2021-4193: fix going beyond the end of the line with /\%V
Important
TuxCare License Agreement
CVE-2021-4192
CVE-2021-4193
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0261, CVE-2022-0213
Community Enterprise Operating System 6
- CVE-2022-0213: fix going over the end of status line buffer
- CVE-2022-0261: fix block insert goes over the end of the line
Important
TuxCare License Agreement
CVE-2022-0213
CVE-2022-0261
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0351, CVE-2022-0368, CVE-2022-0359, CVE-2022-0361
Community Enterprise Operating System 6
- CVE-2022-0351: fix crash caused by too depth recursion
- CVE-2022-0359: fix illegal memory access with large tabstop in ex mode
- CVE-2022-0361: fix illegal memory access when copying lines in visual mode
- CVE-2022-0368: fix illegal memory access when undo makes visual area invalid
Important
TuxCare License Agreement
CVE-2022-0359
CVE-2022-0351
CVE-2022-0361
CVE-2022-0368
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0413, CVE-2022-0417, CVE-2022-0408, CVE-2022-0443
Community Enterprise Operating System 6
- CVE-2022-0408: fix stack corruption when looking for spell suggestions
- CVE-2022-0413: fix using freed memory when substitute with function call
- CVE-2022-0417: fix illegal memory access caused by ':retab 0'
- CVE-2022-0443: fix using freed memory with ':lopen' and ':bwipe'
Important
TuxCare License Agreement
CVE-2022-0417
CVE-2022-0443
CVE-2022-0408
CVE-2022-0413
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0554, CVE-2022-0729, CVE-2022-0685, CVE-2022-0572
Community Enterprise Operating System 6
- CVE-2022-0554: fix ending up with no current buffer
- CVE-2022-0572: fix crashing when repeatedly using :retab
- CVE-2022-0685: fix crashing when using special multi-byte character
- CVE-2022-0729: fix crashing with specific regexp pattern and string
Important
TuxCare License Agreement
CVE-2022-0685
CVE-2022-0729
CVE-2022-0554
CVE-2022-0572
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3778, CVE-2021-3796
Community Enterprise Operating System 6
- CVE-2021-3778: crafted input leads to heap-based buffer overflow
- CVE-2021-3796: crafted input leads to use-after-free
Important
TuxCare License Agreement
CVE-2021-3778
CVE-2021-3796
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3903, CVE-2021-3875, CVE-2021-3872
Community Enterprise Operating System 6
- CVE-2021-3872: fix illegal memory access if buffer name is very long
- CVE-2021-3875: fix ml_get error after search with range
- CVE-2021-3903: fix invalid memory access when scrolling without a valid screen
Important
TuxCare License Agreement
CVE-2021-3875
CVE-2021-3903
CVE-2021-3872
cpe:/o:centos:linux:6:GA
Fixed CVE-2018-25032 in zlib
Community Enterprise Operating System 6
- CVE-2018-25032: Fix memory corruption when deflating
if the input has many distant matches
Important
TuxCare License Agreement
CVE-2018-25032
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-2388
Community Enterprise Operating System 6
- Fix CVE-2021-2388 OpenJDK: Incorrect comparison during range check elimination
Important
TuxCare License Agreement
CVE-2021-2388
cpe:/o:centos:linux:6:GA
Fixed CVEs in java-1.8.0-openjdk: CVE-2022-21496, CVE-2022-21476, CVE-2022-21434, CVE-2022-21443, CVE-2022-21426
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u332-b09. That fixes following CVEs:
- CVE-2022-21476: Defective secure validation in Apache Santuario
- CVE-2022-21496: URI parsing inconsistencies
- CVE-2022-21434: Improper object-to-string conversion in AnnotationInvocationHandler
- CVE-2022-21426: Unbounded memory allocation when compiling crafted XPath expressions
- CVE-2022-21443: Missing check for negative ObjectIdentifier
- Remove patch files from previous change due to their presence in newer versions
Important
TuxCare License Agreement
CVE-2022-21476
CVE-2022-21443
CVE-2022-21496
CVE-2022-21426
CVE-2022-21434
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-8517, CVE-2021-28651, CVE-2020-15049, CVE-2020-8449, CVE-2020-8450, CVE-2020-24606, CVE-2020-25097, CVE-2020-11945, CVE-2020-14058
Community Enterprise Operating System 6
- CVE-2020-15049: fix incorrect validation of Content-Length field leading to
Http smuggling and Poisoning attack
- CVE-2020-14058: fix handling of unknown SSL errors which resulted in denial of
service
- CVE-2020-25097: fix improper input validation allowing HTTP smuggling from
trusted client
- CVE-2020-11945: fix nonce reference counter overflow allowing replay attack
- CVE-2020-24606: fix handle of EOF in peerDigestHandleReply() leading to Denial
of service
- CVE-2020-8517: fix incorrect input validation allowing writing outside of buffer
and leading to denial of service
- CVE-2020-8449: fix improper HTTP request validation allowing access to
resources which are prohibited by security filters
- CVE-2020-8450: fix incorrect buffer managment leading to buffer overflow
- CVE-2021-28651: fix memory leak leading to denial of service
Critical
TuxCare License Agreement
CVE-2020-8449
CVE-2020-11945
CVE-2020-8450
CVE-2020-14058
CVE-2020-8517
CVE-2020-24606
CVE-2020-15049
CVE-2021-28651
CVE-2020-25097
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-24513, CVE-2020-24489, CVE-2020-24512, CVE-2020-24511
Community Enterprise Operating System 6
- Do not use "grep -q" in a pipe in check_caveats.
- Update Intel CPU microcode to microcode-20210608 release:
- Fixes in releasenote.md file.
- Update Intel CPU microcode to microcode-20210525 release, addresses
CVE-2020-24489, CVE-2020-24511, CVE-2020-24512, and CVE-2020-24513
(#1962659, #1962709, #1962729, #1962675):
- Addition of 06-55-05/0xb7 (CLX-SP A0) microcode at revision 0x3000010;
- Addition of 06-6a-05/0x87 (ICX-SP C0) microcode at revision 0xc0002f0;
- Addition of 06-6a-06/0x87 (ICX-SP D0) microcode at revision 0xd0002a0;
- Addition of 06-86-04/0x01 (SNR B0) microcode at revision 0xb00000f;
- Addition of 06-86-05/0x01 (SNR B1) microcode (in intel-ucode/06-86-04)
at revision 0xb00000f;
- Addition of 06-86-04/0x01 (SNR B0) microcode (in intel-ucode/06-86-05)
at revision 0xb00000f;
- Addition of 06-86-05/0x01 (SNR B1) microcode at revision 0xb00000f;
- Addition of 06-8c-02/0xc2 (TGL-R C0) microcode at revision 0x16;
- Addition of 06-8d-01/0xc2 (TGL-H R0) microcode at revision 0x2c;
- Addition of 06-96-01/0x01 (EHL B1) microcode at revision 0x11;
- Addition of 06-9c-00/0x01 (JSL A0/A1) microcode at revision 0x1d;
- Addition of 06-a7-01/0x02 (RKL-S B0) microcode at revision 0x40;
- Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xe2 up to 0xea;
- Update of 06-4f-01/0xef (BDX-E/EP/EX/ML B0/M0/R0) microcode (in
intel-06-4f-01/intel-ucode/06-4f-01) from revision 0xb000038 up
to 0xb00003e;
- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a0a up
to 0x2006b06;
- Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xe2 up to 0xea;
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
intel-06-8c-01/intel-ucode/06-8c-01) from revision 0x68 up to 0x88;
- Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
to 0xea;
- Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
to 0xea;
- Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xe0 up
to 0xea;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xde up
to 0xea;
- Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
revision 0xde up to 0xea;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xde up
to 0xea;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xde up
to 0xea;
- Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xde up
to 0xea;
- Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xde up
to 0xea;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xde up
to 0xea;
- Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
from revision 0x44 up to 0x46;
- Update of 06-3f-04/0x80 (HSX-EX E0) microcode from revision 0x16 up
to 0x19;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000159
up to 0x100015b;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003006
up to 0x4003102;
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
0x5003006 up to 0x5003102;
- Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x700001e
up to 0x7002302;
- Update of 06-56-03/0x10 (BDX-DE V2/V3) microcode from revision
0x7000019 up to 0x700001b;
- Update of 06-56-04/0x10 (BDX-DE Y0) microcode from revision 0xf000017
up to 0xf000019;
- Update of 06-56-05/0x10 (BDX-NS A0/A1, HWL A1) microcode from revision
0xe00000f up to 0xe000012;
- Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x40 up
to 0x44;
- Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x1e up
to 0x20;
- Update of 06-5f-01/0x01 (DNV B0) microcode from revision 0x2e up
to 0x34;
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x34 up
to 0x36;
- Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x18 up
to 0x1a;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xa0
up to 0xa6;
- Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x28 up
to 0x2a;
- Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xe0 up
to 0xea;
- Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xe0
up to 0xea;
- Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xe0
up to 0xec;
- Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xe0
up to 0xe8;
- Update of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode from revision
0xe0 up to 0xea.
- Update Intel CPU microcode to microcode-20210216 release (#1905111):
- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a08 up
to 0x2006a0a;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003003
up to 0x4003006;
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
0x5003003 up to 0x5003006.
- Update Intel CPU microcode to microcode-20201112 release:
- Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up
to 0x34;
- Updated releasenote file.
Important
TuxCare License Agreement
CVE-2020-24489
CVE-2020-24513
CVE-2020-24511
CVE-2020-24512
cpe:/o:centos:linux:6:GA
Update of microcode_ctl
Community Enterprise Operating System 6
- Update Intel CPU microcode to microcode-20220207 release:
- Fixes in releasenote.md file.
Moderate
TuxCare License Agreement
CVE-2021-0145
CVE-2021-0127
CVE-2021-33120
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-27135
Community Enterprise Operating System 6
- CVE-2021-27135: fix crash when processing combining characters
Critical
TuxCare License Agreement
CVE-2021-27135
cpe:/o:centos:linux:6:GA
Fix of 56 CVEs
Community Enterprise Operating System 6
- CVE-2017-7223: Fix global buffer overflow (of size 1)
- CVE-2017-7224: Fix invalid write (of size 1) while disassembling
- CVE-2017-7225: Fix NULL pointer dereference and an invalid write
- CVE-2017-7226: Fix heap-based buffer over-read of size 4049
- CVE-2017-7227: Fix heap-based buffer overflow
- CVE-2017-7299: Fix invalid read (of size 8) in ELF reloc section
- CVE-2017-7300: Fix heap-based buffer over-read (off-by-one)
- CVE-2017-7301: Fix off-by-one vulnerability
- CVE-2017-7302: Fix invalid read (of size 4)
- CVE-2017-7614: Fix undefined behavior issue
- CVE-2017-8393: Fix global buffer over-read error
- CVE-2017-8394: Fix invalid read of size 4 due to NULL pointer dereferencing
- CVE-2017-8398: Fix invalid read of size 1 during dumping of debug information
- CVE-2017-8421: Fix memory leak vulnerability
- CVE-2017-9742: Fix buffer overflow
- CVE-2017-9744: Fix buffer overflow
- CVE-2017-9747: Fix buffer overflow
- CVE-2017-9748: Fix buffer overflow
- CVE-2017-9749: Fix buffer overflow
- CVE-2017-9753: Fix buffer overflow
- CVE-2017-9754: Fix buffer overflow
- CVE-2017-12448: Fix use after free
- CVE-2017-12449: Fix out of bounds heap read
- CVE-2017-12455: Fix out of bounds heap read
- CVE-2017-12457: Fix NULL dereference
- CVE-2017-12458: Fix out of bounds heap read
- CVE-2017-12459: Fix out of bounds heap write
- CVE-2017-12450: Fix out of bounds heap write
- CVE-2017-12452: Fix out of bounds heap read
- CVE-2017-12453: Fix out of bounds heap read
- CVE-2017-12454: Fix arbitrary memory read
- CVE-2017-12456: Fix out of bounds heap read
- CVE-2017-14333: Fix integer overflow, and hang because of a time-consuming loop
- CVE-2017-12451: Fix out of bounds stack read
- CVE-2017-12799: Fix buffer overflow
- CVE-2017-13710: Fix NULL pointer dereference
- CVE-2017-14130: Fix _bfd_elf_attr_strdup heap-based buffer over-read
- CVE-2017-14932: Fix infinite loop
- CVE-2017-14938: Fix excessive memory allocation
- CVE-2017-14940: Fix NULL pointer dereference
- CVE-2017-15020: Fix parse_die heap-based buffer over-read
- CVE-2017-15022: Fix bfd_hash_hash NULL pointer dereference
- CVE-2017-15225: Fix divide-by-zero error
- CVE-2017-15938: Fix find_abstract_instance_name invalid memory read, segmentation fault
- CVE-2017-15939: Fix NULL pointer dereference
- CVE-2017-15996: Fix buffer overflow on fuzzed archive header
- CVE-2017-16826: Fix invalid memory access
- CVE-2017-16827: slurp_symtab invalid free
- CVE-2017-16828: Fix integer overflow and heap-based buffer over-read
- CVE-2017-16831: Fix integer overflow or excessive memory allocation
- CVE-2017-17080: Fix bfd_getl32 heap-based buffer over-read
- CVE-2017-8396: Fix invalid read of size 1
- CVE-2017-17121: Fix memory access violation
- CVE-2017-17123: Fix NULL pointer dereference
- CVE-2017-17124: Fix excessive memory consumption or heap-based buffer overflow
- CVE-2017-17125: Fix buffer over-read
Critical
TuxCare License Agreement
CVE-2017-14130
CVE-2017-15225
CVE-2017-14940
CVE-2017-16826
CVE-2017-8398
CVE-2017-12449
CVE-2017-9747
CVE-2017-12458
CVE-2017-12453
CVE-2017-14932
CVE-2017-15938
CVE-2017-17123
CVE-2017-12456
CVE-2017-7225
CVE-2017-8394
CVE-2017-8421
CVE-2017-9749
CVE-2017-15020
CVE-2017-15939
CVE-2017-15996
CVE-2017-17124
CVE-2017-12454
CVE-2017-12452
CVE-2017-8396
CVE-2017-7226
CVE-2017-12457
CVE-2017-9744
CVE-2017-9742
CVE-2017-9754
CVE-2017-14333
CVE-2017-14938
CVE-2017-12451
CVE-2017-16828
CVE-2017-17080
CVE-2017-7302
CVE-2017-7300
CVE-2017-7299
CVE-2017-17125
CVE-2017-12459
CVE-2017-12448
CVE-2017-13710
CVE-2017-7223
CVE-2017-9748
CVE-2017-16831
CVE-2017-17121
CVE-2017-7224
CVE-2017-9753
CVE-2017-16827
CVE-2017-12450
CVE-2017-15022
CVE-2017-8393
CVE-2017-7614
CVE-2017-12455
CVE-2017-12799
CVE-2017-7301
CVE-2017-7227
cpe:/o:centos:linux:6:GA
Fix of 36 CVEs
Community Enterprise Operating System 6
- CVE-2018-6323: Fix unsigned integer overflow
- CVE-2018-19931: Fix heap-based buffer overflow in bfd_elf32_swap_phdr_in
- CVE-2018-6543: Fix integer overflow
- CVE-2018-20671: Fix integer overflow vulnerability
- CVE-2018-6759: Fix segmentation fault
- CVE-2018-7208: Fix segmentation fault
- CVE-2018-7568: Fix integer overflow
- CVE-2018-7569: Fix integer underflow or overflow
- CVE-2018-7642: Fix aout_32_swap_std_reloc_out NULL pointer dereference
- CVE-2018-7643: Fix integer overflow
- CVE-2018-8945: Fix segmentation fault
- CVE-2018-13033: Fix excessive memory allocation
- CVE-2018-10373: Fix NULL pointer dereference
- CVE-2018-10535: Fix NULL pointer dereference
- CVE-2018-18309: Fix invalid memory address dereference
- CVE-2018-18605: Fix mishandles section merges
- CVE-2018-18606: Fix NULL pointer dereference
- CVE-2018-18607: Fix NULL pointer dereference in elf_link_input_bfd
- CVE-2018-19932: Fix integer overflow and infinite loop
- CVE-2018-20002: Fix memory consumption
- CVE-2018-20623: Fix use-after-free in the error function
- CVE-2018-1000876: Fix integer overflow trigger heap overflow
- CVE-2019-9073: Fix excessive memory allocation
- CVE-2019-9075: Fix heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap
- CVE-2019-9077: Fix heap-based buffer overflow in process_mips_specific
- CVE-2019-12972: Fix heap-based buffer over-read in _bfd_doprnt
- CVE-2019-14444: Fix integer overflow
- CVE-2019-17450: Fix infinite recursion
- CVE-2016-2226: Fix integer overflow in the string_appends function in cplus-dem.c
- CVE-2016-4487: Fix use-after-free vulnerability in libiberty
- CVE-2016-4488: Fix use-after-free vulnerability in libiberty
- CVE-2016-4489: Fix integer overflow in libiberty
- CVE-2016-4490: Fix integer overflow in cp-demangle.c in libiberty
- CVE-2016-4492: Fix buffer overflow in the do_type function in cplus-dem.c in libiberty
- CVE-2016-4493: Fix out-of-bounds read in demangle_template_value_parm and do_hpacc_template_literal
- CVE-2016-6131: Fix infinite loop, stack overflow
Important
TuxCare License Agreement
CVE-2018-20671
CVE-2018-8945
CVE-2018-18606
CVE-2019-9075
CVE-2019-12972
CVE-2018-20623
CVE-2016-4487
CVE-2018-6759
CVE-2018-7642
CVE-2018-7643
CVE-2018-13033
CVE-2018-18309
CVE-2018-1000876
CVE-2016-4489
CVE-2016-4492
CVE-2019-14444
CVE-2018-10373
CVE-2019-17450
CVE-2018-6543
CVE-2018-7568
CVE-2019-9077
CVE-2018-6323
CVE-2018-18607
CVE-2018-19932
CVE-2018-19931
CVE-2016-4488
CVE-2018-20002
CVE-2019-9073
CVE-2018-7569
CVE-2016-4493
CVE-2016-4490
CVE-2016-6131
CVE-2016-2226
CVE-2018-10535
CVE-2018-7208
CVE-2018-18605
cpe:/o:centos:linux:6:GA
Fix of 14 CVEs
Community Enterprise Operating System 6
- CVE-2018-9138: Fix stack exhaustion
- CVE-2018-12641: Fix stack exhaustion
- CVE-2018-12697: Fix NULL pointer dereference
- CVE-2018-12698: Fix memory consumption
- CVE-2018-12699: Fix heap-based buffer overflow
- CVE-2018-12700: Fix infinite recursion
- CVE-2018-17794: Fix NULL pointer dereference
- CVE-2018-17985: Fix recursive calls
- CVE-2018-18484: Fix stack exhaustion
- CVE-2018-18700: Fix stack consumption vulnerability
- CVE-2018-18701: Fix infinite recursion
- CVE-2018-18483: Fix malloc call with the result of an integer-overflowing
- CVE-2018-12934: Fix excessive memory consumption
- CVE-2021-45078: Fix heap-based buffer overflow
Critical
TuxCare License Agreement
CVE-2018-9138
CVE-2021-45078
CVE-2018-12697
CVE-2018-18483
CVE-2018-18701
CVE-2018-18484
CVE-2018-17985
CVE-2018-18700
CVE-2018-12700
CVE-2018-12934
CVE-2018-17794
CVE-2018-12641
CVE-2018-12698
CVE-2018-12699
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-3487
Community Enterprise Operating System 6
- CVE-2021-3487: excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section().
Moderate
TuxCare License Agreement
CVE-2021-3487
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2022-0547
Community Enterprise Operating System 6
- CVE-2022-0547: Fix authentication bypass via multiple deferred authentication plug-ins
Critical
TuxCare License Agreement
CVE-2022-0547
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-27212
Community Enterprise Operating System 6
- CVE-2021-27212: fix DoS via malicious packet
Important
TuxCare License Agreement
CVE-2021-27212
cpe:/o:centos:linux:6:GA
Community Enterprise Operating System 6
- CVE-2022-29155: fix SQL injection vulnerability caused by LDAP search operation
Critical
TuxCare License Agreement
CVE-2022-29155
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-28651
Community Enterprise Operating System 6
- CVE-2021-28651: fix memory leak leading to denial of service
Important
TuxCare License Agreement
CVE-2021-28651
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-8450, CVE-2020-8517, CVE-2020-8449
Community Enterprise Operating System 6
- CVE-2020-8449: fix improper HTTP request validation allowing access to
resources which are prohibited by security filters
- CVE-2020-8450: fix incorrect buffer managment leading to buffer overflow
- CVE-2020-8517: fix incorrect input validation allowing writing outside of buffer
and leading to denial of service
Critical
TuxCare License Agreement
CVE-2020-25097
CVE-2020-8450
CVE-2020-8517
CVE-2020-24606
CVE-2020-8449
CVE-2020-11945
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2020-14058, CVE-2020-15049
Community Enterprise Operating System 6
- CVE-2020-14058: fix handling of unknown SSL errors which resulted in denial of
service
- CVE-2020-15049: fix incorrect validation of Content-Length field leading to
Http smuggling and Poisoning attack
Important
TuxCare License Agreement
CVE-2020-15049
CVE-2020-14058
cpe:/o:centos:linux:6:GA
Fix of Add fix for CVE-2020-29599
Community Enterprise Operating System 6
- Add fix for CVE-2020-29599
Important
TuxCare License Agreement
CVE-2020-29599
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-4034
Community Enterprise Operating System 6
- CVE-2021-4034: pkexec: argv overflow results in local privilege esc.
Important
TuxCare License Agreement
CVE-2021-4034
cpe:/o:centos:linux:6:GA
Fix of CVE: CVE-2021-26937
Community Enterprise Operating System 6
- fix CVE-2021-26937
Critical
TuxCare License Agreement
CVE-2021-26937
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-2289, CVE-2022-2304
Community Enterprise Operating System 6
- CVE-2022-2289: bail out when diff pointer is no longer valid to avoid accessing
freed memory with diff put
- CVE-2022-2304: limit the word length to avoid out of bound accesing
Important
TuxCare License Agreement
CVE-2022-2289
CVE-2022-2304
cpe:/o:centos:linux:6:GA
Fixed CVE-2021-22543 in kernel
Community Enterprise Operating System 6
- KVM: do not allow mapping valid but non-reference-counted pages {CVE-2021-22543}
Important
TuxCare License Agreement
CVE-2021-22543
cpe:/o:centos:linux:6:GA
Fixed CVEs in java-1.8.0-openjdk: CVE-2022-34169, CVE-2022-21541, CVE-2022-21540
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u342-b07. That fixes following CVEs:
- CVE-2022-34169: Integer truncation issue in Xalan-J
- CVE-2022-21540: Class compilation issue
- CVE-2022-21541: Improper restriction of MethodHandle.invokeBasic()
- Update tzdata requirement to 2022a to match JDK-8283350
- Remove patch for MakeBase.gmk cause issue was fixed in sources
- Correct parameters passing to CheckVendor test
Critical
TuxCare License Agreement
CVE-2022-34169
CVE-2022-21540
CVE-2022-21541
cpe:/o:centos:linux:6:GA
Fixed CVE-2021-21702 in php
Community Enterprise Operating System 6
- CVE-2021-21702: Fix null pointer dereference in Soap Client
Important
TuxCare License Agreement
CVE-2021-21702
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-2344, CVE-2022-2343, CVE-2022-2345, CVE-2022-2522
Community Enterprise Operating System 6
- CVE-2022-2345: fix using freed memory with recursive substitute
- CVE-2022-2344: fix reading past end of completion with duplicate match
- CVE-2022-2343: fix reading past end of completion with a long line and 'infercase'
set
- CVE-2022-2522: fix accessing uninitialized memory when completing long line
Important
TuxCare License Agreement
CVE-2022-2343
CVE-2022-2345
CVE-2022-2522
CVE-2022-2344
cpe:/o:centos:linux:6:GA
Fixed CVEs in exim: CVE-2022-37452, CVE-2022-37451
Community Enterprise Operating System 6
- CVE-2022-37452: fix heap-based buffer overflow for the alias list in
host_name_lookup()
- CVE-2022-37451: fix invalid free in pam_converse()
Critical
TuxCare License Agreement
CVE-2022-37452
CVE-2022-37451
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-29154 in rsync
Community Enterprise Operating System 6
- CVE-2022-29154: fix arbitrary file write vulnerability via malicious rysnc
server (MITM attack)
- Add '%check
unset DISPLAY
' section but disable broken 'daemon' and 'hardlinks' tests
Important
TuxCare License Agreement
CVE-2022-29154
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-37434 in zlib
Community Enterprise Operating System 6
- CVE-2022-37434: fix possible buffer overflow when getting a gzip header extra field
with inflate()
Critical
TuxCare License Agreement
CVE-2022-37434
cpe:/o:centos:linux:6:GA
Fixed 13 CVEs in expat
Community Enterprise Operating System 6
- CVE-2022-25236: Fix insertion of namespace-separator characters into
namespace URIs
- CVE-2022-25235: Fix malformed UTF-8 sequences which can lead to
arbitrary code execution
- CVE-2022-25315: Fix integer overflow in storeRawNames()
- CVE-2022-22822: Fix integer overflow in addBinding()
- CVE-2022-22823: Fix integer overflow in build_model()
- CVE-2022-22824: Fix integer overflow in defineAttribute()
- CVE-2022-22825: Fix integer overflow in lookup()
- CVE-2022-22826: Fix integer overflow in nextScaffoldPart()
- CVE-2022-22827: Fix integer overflow in storeAtts()
- CVE-2022-23852: Fix integer overflow in XML_GetBuffer()
- CVE-2021-46143: Fix integer overflow on m_groupSize in doProlog()
- CVE-2021-45960: Fix troublesome left shifts in storeAtts()
- CVE-2022-23990: Fix integer overflow in doProlog()
Critical
TuxCare License Agreement
CVE-2022-22825
CVE-2021-46143
CVE-2021-45960
CVE-2022-23990
CVE-2022-25235
CVE-2022-22826
CVE-2022-23852
CVE-2022-22827
CVE-2022-25236
CVE-2022-22824
CVE-2022-22823
CVE-2022-22822
CVE-2022-25315
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-2581 in vim
Community Enterprise Operating System 6
- CVE-2022-2581: fix illegal memory access when pattern starts with illegal byte
Important
TuxCare License Agreement
CVE-2022-2581
cpe:/o:centos:linux:6:GA
Fixed 50 CVEs in java-1.7.0-openjdk
Community Enterprise Operating System 6
- Bump to 2.6.28 and OpenJDK 7u351-b01.
- Security fixes in 7u351:
- CVE-2022-21540: Improve class compilation (JDK-8281859)
- CVE-2022-21541: Enhance MethodHandle invocations (JDK-8281866)
- CVE-2022-34169: Improve Xalan supports (JDK-8285407)
- Security fixes in 7u341:
- CVE-2022-21426: Better XPath expression handling (JDK-8270504)
- CVE-2022-21434: Better invocation handler handling (JDK-8277672)
- CVE-2022-21443: Improved Object Identification (JDK-8275151)
- CVE-2022-21476: Improve Santuario processing (JDK-8278008)
- CVE-2022-21496: Improve URL supports (JDK-8278972)
- Security fixes in 7u331:
- CVE-2022-21248: Enhance cross VM serialization (JDK-8264934)
- CVE-2022-21282: Better resolution of URIs (JDK-8270492)
- CVE-2022-21283: Better String matching (JDK-8268813)
- CVE-2022-21293: Improve String constructions (JDK-8270392)
- CVE-2022-21294: Enhance construction of Identity maps (JDK-8270416)
- CVE-2022-21296: Improve SAX Parser configuration management (JDK-8270498)
- CVE-2022-21299: Improved scanning of XML entities (JDK-8270646)
- CVE-2022-21305: Better array indexing (JDK-8272014)
- CVE-2022-21340: Verify Jar Verification (JDK-8272026)
- CVE-2022-21341: Improve serial forms for transport (JDK-8272236)
- CVE-2022-21349: Improve Solaris font rendering (JDK-8273748)
- CVE-2022-21360: Enhance BMP image support (JDK-8273756)
- CVE-2022-21365: Enhanced BMP processing (JDK-8273838)
- Security fixes in 7u321:
- CVE-2021-35550: Update the default enabled cipher suites preference
(JDK-8163326)
- CVE-2021-35556: Richer Text Editors (JDK-8265167)
- CVE-2021-35559: Enhanced style for RTF kit (JDK-8265580)
- CVE-2021-35561: Better hashing support (JDK-8266097)
- CVE-2021-35564: Improve Keystore integrity (JDK-8266137)
- CVE-2021-35565: com.sun.net.HttpsServer spins on TLS session close
(JDK-8254967)
- CVE-2021-35586: Better BMP support (JDK-8267735)
- CVE-2021-35588: InnerClasses: VM permits wrong Throw ClassFormatError if
InnerClasses attribute's inner_class_info_index is 0 (JDK-8130183)
- CVE-2021-35603: Better session identification (JDK-8269618)
- Security fixes in 7u311:
- CVE-2021-2341: Improve file transfers (JDK-8258432)
- CVE-2021-2369: Better jar file validation (JDK-8260967)
- CVE-2021-2432: Provide better LDAP provider support (JDK-8267412)
- Security fixes in 7u301:
- CVE-2021-2161: Less ambiguous processing (JDK-8250568)
- CVE-2021-2163: Enhance opening JARs (JDK-8249906)
- Security fixes in 7u281:
- CVE-2020-14779: Enhance support of Proxy class (JDK-8236862)
- CVE-2020-14781: Enhanced LDAP contexts (JDK-8237990)
- CVE-2020-14782: Enhance certificate processing (JDK-8237995)
- CVE-2020-14792: Better range handling (JDK-8241114)
- CVE-2020-14796: Improved URI Support (JDK-8242680)
- CVE-2020-14797: Better Path Validation (JDK-8242685)
- CVE-2020-14798: Enhanced buffer support (JDK-8242695)
- CVE-2020-14803: Improved Buffer supports (JDK-8244136)
- Security fixes in 7u271:
- CVE-2020-14577: Enhance certificate verification (JDK-8237592)
- CVE-2020-14578: NegativeArraySizeException in
sun.security.util.DerInputStream.getUnalignedBitString() (JDK-8028591)
- CVE-2020-14579: NullPointerException in DerValue.equals(DerValue)
(JDK-8028431)
- CVE-2020-14581: Better matrix operations (JDK-8238002)
- CVE-2020-14583: Better Buffer support (JDK-8238920)
- CVE-2020-14593: Less Affine Transformations (JDK-8240119)
- CVE-2020-14621: Better XML namespace handling (JDK-8242136)
- Update tzdata requirement to 2022a to match JDK-8283350
- Update NEWS from IcedTea
- Adjust jdk8076221-pr2809-disable_rc4_cipher_suites.patch to apply after
bump OpenJDK version
Critical
TuxCare License Agreement
CVE-2022-21365
CVE-2022-21296
CVE-2022-21360
CVE-2022-21341
CVE-2021-2163
CVE-2022-21282
CVE-2022-21340
CVE-2022-21305
CVE-2022-21293
CVE-2022-21540
CVE-2022-21541
CVE-2022-34169
CVE-2022-21283
CVE-2022-21496
CVE-2021-35550
CVE-2021-35561
CVE-2021-35586
CVE-2021-35603
CVE-2020-14797
CVE-2020-14578
CVE-2020-14577
CVE-2020-14583
CVE-2020-14579
CVE-2020-14798
CVE-2020-14792
CVE-2020-14779
CVE-2021-2369
CVE-2021-35588
CVE-2022-21476
CVE-2022-21294
CVE-2021-35556
CVE-2022-21426
CVE-2022-21434
CVE-2021-2161
CVE-2020-14621
CVE-2020-14593
CVE-2020-14581
CVE-2020-14803
CVE-2020-14796
CVE-2020-14782
CVE-2020-14781
CVE-2021-2341
CVE-2021-35565
CVE-2021-35564
CVE-2021-35559
CVE-2022-21443
CVE-2022-21299
CVE-2022-21349
CVE-2022-21248
CVE-2021-2432
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-2845, CVE-2022-2849
Community Enterprise Operating System 6
- CVE-2022-2849: fix invalid memory access with for loop over NULL string
- CVE-2022-2845: fix reading before the start of the line
Important
TuxCare License Agreement
CVE-2022-2845
CVE-2022-2849
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-37434 in rsync
Community Enterprise Operating System 6
- CVE-2022-37434: fix possible buffer overflow when getting a gzip header extra field
with inflate()
Critical
TuxCare License Agreement
CVE-2022-37434
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-29154 in rsync
Community Enterprise Operating System 6
- CVE-2022-29154: fix arbitrary file write vulnerability via malicious rsync
server (MITM attack), refactoring
- fix test-system components, enable 'daemon' and 'hardlinks' tests
Important
TuxCare License Agreement
CVE-2022-29154
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-28614 in httpd
Community Enterprise Operating System 6
- CVE-2022-28614: fix out-of-bounds read via ap_rwrite()
Moderate
TuxCare License Agreement
CVE-2022-28614
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-28614 in httpd
Community Enterprise Operating System 6
- CVE-2022-28614: fix out-of-bounds read via ap_rwrite(), refactoring
Moderate
TuxCare License Agreement
CVE-2022-28614
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-40674 in expat
Community Enterprise Operating System 6
- CVE-2022-40674: Ensure raw tagnames are safe exiting
internalEntityParser
- fix tests leak
- fix xmlparse leak
Critical
TuxCare License Agreement
CVE-2022-40674
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-3256 in vim
Community Enterprise Operating System 6
- CVE-2022-3256: copy the mark before editing another buffer
Important
TuxCare License Agreement
CVE-2022-2946
CVE-2022-3037
CVE-2022-3134
CVE-2022-3234
CVE-2022-3256
CVE-2022-3099
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-2795 in bind
Community Enterprise Operating System 6
- CVE-2022-2795: fix possible resolver performance degradation when processing large delegations
Important
TuxCare License Agreement
CVE-2022-2795
cpe:/o:centos:linux:6:GA
Fixed CVEs in sqlite: CVE-2020-35525, CVE-2020-13435
Community Enterprise Operating System 6
- CVE-2020-13435: add a code that tries to prevent a recurrence of
problems
- CVE-2020-35525: a potential null pointer dereference was fixed
Important
TuxCare License Agreement
CVE-2020-35525
CVE-2020-13435
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-41318 in squid
Community Enterprise Operating System 6
- CVE-2022-41318: Fix buffer-over-read in SSPI and SMB authentication
Important
TuxCare License Agreement
CVE-2022-41318
cpe:/o:centos:linux:6:GA
Fixed CVE-2022-41318 in squid34
Community Enterprise Operating System 6
- CVE-2022-41318: Fix buffer-over-read in SSPI and SMB authentication
Important
TuxCare License Agreement
CVE-2022-41318
cpe:/o:centos:linux:6:GA
Fixed CVEs in vim: CVE-2022-3296, CVE-2022-3324
Community Enterprise Operating System 6
- CVE-2022-3296: check CSF_TRY can be found
- CVE-2022-3324: make sure the window width does not become negative
Important
TuxCare License Agreement
CVE-2022-3296
CVE-2022-3324
cpe:/o:centos:linux:6:GA
expat: Fix of CVE-2022-43680
Community Enterprise Operating System 6
- CVE-2022-43680: Fix overeager DTD destruction
Important
TuxCare License Agreement
CVE-2022-43680
cpe:/o:centos:linux:6:GA
perl: Fix of CVE-2020-16156
Community Enterprise Operating System 6
- CVE-2020-16156: recognize CANNOT_VERIFY signature verification type
Important
TuxCare License Agreement
CVE-2020-16156
cpe:/o:centos:linux:6:GA
sqlite: Fix of CVE-2022-35737
Community Enterprise Operating System 6
- CVE-2022-35737: fix a buffer overflow
Important
TuxCare License Agreement
CVE-2022-35737
cpe:/o:centos:linux:6:GA
nginx: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-41741: fix memory corruption in the ngx_http_mp4_module
- CVE-2022-41742: fix memory disclosure in the ngx_http_mp4_module
Important
TuxCare License Agreement
CVE-2022-41741
CVE-2022-41742
cpe:/o:centos:linux:6:GA
xterm: Fix of CVE-2022-45063
Community Enterprise Operating System 6
- CVE-2022-45063: improve error recovery when setting a bitmap font for the VT100 window
- Add NULL pointer checks in x_strcasecmp() and x_strncasecmp() to help with error
recovery for a missing font
Critical
TuxCare License Agreement
CVE-2022-45063
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2022-45061
Community Enterprise Operating System 6
- CVE-2022-45061: Fix quadratic time idna decoding
- fix tests to be compatible with expat 2.0.1-tuxcare.els
Important
TuxCare License Agreement
CVE-2022-45061
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2022-3352
Community Enterprise Operating System 6
- CVE-2022-3352: disallow deleting the current buffer to avoid using freed memory
Important
TuxCare License Agreement
CVE-2022-3352
cpe:/o:centos:linux:6:GA
libxml2: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-40303: fix integer overflows with XML_PARSE_HUGE
- CVE-2022-40304: fix dict corruption caused by entity reference cycles
Important
TuxCare License Agreement
CVE-2022-40304
CVE-2022-40303
cpe:/o:centos:linux:6:GA
krb5: Fix of CVE-2022-42898
Community Enterprise Operating System 6
- CVE-2022-42898: Fix integer overflows in PAC parsing
- A test-suite was activated
Moderate
TuxCare License Agreement
CVE-2022-42898
cpe:/o:centos:linux:6:GA
vim: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-4141: check for text locked in CTRL-W gf
- CVE-2022-3520: check that the column does not become negative
Critical
TuxCare License Agreement
CVE-2022-3520
CVE-2022-4141
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2022-4292
Community Enterprise Operating System 6
- CVE-2022-4292: bail out if the window no longer exists
Important
TuxCare License Agreement
CVE-2022-4292
cpe:/o:centos:linux:6:GA
curl: Fix of CVE-2022-32221
Community Enterprise Operating System 6
- CVE-2022-32221: fix issue when POST following PUT confusion
Critical
TuxCare License Agreement
CVE-2022-32221
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2022-3591
Community Enterprise Operating System 6
- CVE-2022-3591: disallow navigating to a dummy buffer
Important
TuxCare License Agreement
CVE-2022-3591
cpe:/o:centos:linux:6:GA
openssh: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2019-6109: verify character encoding in progress display to avoid
spoofing of scp client output
- CVE-2016-10012: updated to fix server-side protocol errors observed
during rekeying with compression enabled
Moderate
TuxCare License Agreement
CVE-2019-6109
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-0049
Community Enterprise Operating System 6
- CVE-2023-0049: fix out-of-bounds read
Important
TuxCare License Agreement
CVE-2023-0049
cpe:/o:centos:linux:6:GA
httpd: Fix of CVE-2022-36760
Community Enterprise Operating System 6
- CVE-2022-36760: mod_proxy_ajp: fix possible HTTP request smuggling
Critical
TuxCare License Agreement
CVE-2022-36760
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-0433
Community Enterprise Operating System 6
- CVE-2023-0433: check for not going over the end of the line
Important
TuxCare License Agreement
CVE-2023-0433
cpe:/o:centos:linux:6:GA
sudo: Fix of CVE-2023-22809
Community Enterprise Operating System 6
- CVE-2023-22809: do not permit editor arguments to include "--" for sudoedit
- build tests have been enabled
Important
TuxCare License Agreement
CVE-2023-22809
cpe:/o:centos:linux:6:GA
java-1.8.0-openjdk: Fix of 2 CVEs
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u362-b09. That fixes following CVEs:
- CVE-2023-21830: Improper restrictions in CORBA deserialization (Serialization, 8285021)
- CVE-2023-21843: Soundbank URL remote loading (Sound, 8293742)
- Update tzdata requirement to 2022g to match JDK-8297804
- Remove patches which are in upstream now
- Remove the obsolete rh1163501 patch
Moderate
TuxCare License Agreement
CVE-2023-21843
CVE-2023-21830
cpe:/o:centos:linux:6:GA
openssl: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-0215: Fix a UAF resulting from a bug in BIO_new_NDEF
- CVE-2023-0286: Fix GENERAL_NAME_cmp for x400Address
Important
TuxCare License Agreement
CVE-2023-0215
CVE-2023-0286
cpe:/o:centos:linux:6:GA
git: Fix of 4 CVEs
Community Enterprise Operating System 6
- CVE-2022-41903: fix out-of-bounds write caused by integer overflow
- CVE-2021-40330: forbid newlines in host and path
- CVE-2022-39260: reject too long command line strings
- CVE-2023-23946: prevent git-apply from writing behind newly created symbolic links
Critical
TuxCare License Agreement
CVE-2023-23946
CVE-2021-40330
CVE-2022-39260
CVE-2022-41903
cpe:/o:centos:linux:6:GA
tar: Fix of CVE-2022-48303
Community Enterprise Operating System 6
- CVE-2022-48303: check for the end of field after leading byte (0x80 or 0xff)
of base-256 encoded header value
Important
TuxCare License Agreement
CVE-2022-48303
cpe:/o:centos:linux:6:GA
httpd: Fix of CVE-2006-20001
Community Enterprise Operating System 6
- CVE-2006-20001: mod_dav: out-of-bounds read/write
Important
TuxCare License Agreement
CVE-2006-20001
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2023-24329
Community Enterprise Operating System 6
- CVE-2023-24329: Prevent urllib.parse.urlparse from accepting schemes that
don't begin with an alphabetical ASCII character
Important
TuxCare License Agreement
CVE-2023-24329
cpe:/o:centos:linux:6:GA
php: Fix of 3 CVEs
Community Enterprise Operating System 6
- CVE-2023-0567: crypt: Fix validation of malformed BCrypt hashes
- CVE-2023-0568: Fix array overrun when appending slash to paths
- CVE-2023-0662: Fix DoS vulnerability when parsing multipart request body
Important
TuxCare License Agreement
CVE-2023-0568
CVE-2023-0567
CVE-2023-0662
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-1175
Community Enterprise Operating System 6
- CVE-2023-1175: make sure "startspaces" is not negative
Important
TuxCare License Agreement
CVE-2023-1175
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-1170
Community Enterprise Operating System 6
- CVE-2023-1170: adjust the cursor column if needed
Moderate
TuxCare License Agreement
CVE-2023-1170
cpe:/o:centos:linux:6:GA
nss: Fix of CVE-2023-0767
Community Enterprise Operating System 6
- CVE-2023-0767: nss: improve handling of unknown PKCS#12 safe bag types
Important
TuxCare License Agreement
CVE-2023-0767
cpe:/o:centos:linux:6:GA
curl: Fix of 3 CVEs
Community Enterprise Operating System 6
- CVE-2023-27533: prevent TELNET option from IAC injection
- CVE-2023-27535: fix behavior when FTP too eager connection reuse
- CVE-2023-27536: do not reuse connections with different GSS delegations
Critical
TuxCare License Agreement
CVE-2023-27536
CVE-2023-27535
CVE-2023-27533
cpe:/o:centos:linux:6:GA
curl: Fix of CVE-2023-27534
Community Enterprise Operating System 6
- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix resolving SCP relative path
Important
TuxCare License Agreement
CVE-2023-27534
cpe:/o:centos:linux:6:GA
kernel: Fix of 7 CVEs
Community Enterprise Operating System 6
- mISDN: fix use-after-free bugs in l1oip timer handlers {CVE-2022-3565}
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() {CVE-2023-1118}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989}
- proc: proc_skip_spaces() shouldn't think it is working on C strings {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long {CVE-2022-4378}
- floppy: use a statically allocated error counter {CVE-2022-1652}
- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register {CVE-2022-1353}
- usb: mon: make mmapped memory read only {CVE-2022-43750}
Important
TuxCare License Agreement
CVE-2022-1353
CVE-2022-3565
CVE-2022-1652
CVE-2023-1989
CVE-2022-4378
CVE-2023-1118
CVE-2022-43750
cpe:/o:centos:linux:6:GA
openssl: Fix of 3 CVEs
Community Enterprise Operating System 6
- CVE-2023-0464: Fix excessive resource use verifying X.509 policy constraints
- CVE-2023-0466: Fix documentation of X509_VERIFY_PARAM_add0_policy()
- CVE-2022-3996: Drop redundant flag setting in policy_cache_set_mapping()
Important
TuxCare License Agreement
CVE-2023-0466
CVE-2023-0464
CVE-2022-3996
cpe:/o:centos:linux:6:GA
git: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-25652: removing a link instead of writing into
- CVE-2023-29007: restrict the config file line length to parse it whole
- tests were activated
- a buffer overflow during reading of configuration's enormous value has been fixed
Important
TuxCare License Agreement
CVE-2023-25652
CVE-2023-29007
cpe:/o:centos:linux:6:GA
sysstat: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-39377: fix possible buffer overflow
- CVE-2023-33204: fix possible buffer overflow in an incomplete fix for
CVE-2022-39377
Important
TuxCare License Agreement
CVE-2022-39377
CVE-2023-33204
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-2610
Community Enterprise Operating System 6
- CVE-2023-2610: limit the text length to MAXCOL
Important
TuxCare License Agreement
CVE-2023-2610
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-2609
Community Enterprise Operating System 6
- CVE-2023-2609: check "y_array" is not NULL
Important
TuxCare License Agreement
CVE-2023-2609
cpe:/o:centos:linux:6:GA
openssl: Fix of CVE-2023-2650
Community Enterprise Operating System 6
- CVE-2023-2650: Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will
translate
- Update expired smime/SM2 certificates that affect tests.
Important
TuxCare License Agreement
CVE-2023-2650
cpe:/o:centos:linux:6:GA
exim: Fix of CVE-2021-38371
Community Enterprise Operating System 6
- CVE-2021-38371: Enforce STARTTLS sync point, client side
in src/transports/smtp.c
Important
TuxCare License Agreement
CVE-2021-38371
cpe:/o:centos:linux:6:GA
java-1.8.0-openjdk: Fix of 7 CVEs
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u372-b07. That fixes following CVEs:
- CVE-2023-21930: Improper connection handling during TLS handshake (8294474)
- CVE-2023-21937: Missing string checks for NULL characters (8296622)
- CVE-2023-21938: Incorrect handling of NULL characters in ProcessBuilder (8295304)
- CVE-2023-21939: Swing HTML parsing issue (8296832)
- CVE-2023-21954: Incorrect enqueue of references in garbage collector (8298191)
- CVE-2023-21967: Certificate validation issue in TLS session negotiation (8298310)
- CVE-2023-21968: Missing check for slash characters in URI-to-path conversion (8298667)
- Update tzdata requirement to 2023c to match JDK-8305113
- Include JDK-8271199 fix from the upcoming jdk8u382 in advance
- Remove patches which are not used
Important
TuxCare License Agreement
CVE-2023-21968
CVE-2023-21930
CVE-2023-21937
CVE-2023-21938
CVE-2023-21939
CVE-2023-21967
CVE-2023-21954
cpe:/o:centos:linux:6:GA
openldap: Fix of CVE-2023-2953
Community Enterprise Operating System 6
- CVE-2023-2953: added check for strdup failure, to avoid null pointer dereference
Important
TuxCare License Agreement
CVE-2023-2953
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2023-24329
Community Enterprise Operating System 6
- CVE-2023-24329: part2: Start stripping C0 control and space chars in `urlsplit`
- Also correct the first CVE-2023-24329 patch: Fix test_attributes_bad_scheme
to check for non-ascii symbol as first character of url
Important
TuxCare License Agreement
CVE-2023-24329
cpe:/o:centos:linux:6:GA
java-1.8.0-openjdk: Fix of 2 CVEs
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u382-b05. That fixes following CVEs:
- CVE-2023-22045: Array indexing integer overflow issue. (8304468)
- CVE-2023-22049: Improper handling of slash characters in URI-to-path conversion (8305312)
- Remove patch for pkcs11 cause issue was fixed in sources
Low
TuxCare License Agreement
CVE-2023-22045
CVE-2023-22049
cpe:/o:centos:linux:6:GA
openssh: Fix of CVE-2023-38408
Community Enterprise Operating System 6
- CVE-2023-38408: checks libraries before dlopen
Critical
TuxCare License Agreement
CVE-2023-38408
cpe:/o:centos:linux:6:GA
microcode_ctl: Fix of CVE-2023-20593
Community Enterprise Operating System 6
- Update AMD CPU microcode to 2023-07-19 addresses CVE-2023-20593:
- Addition AMD CPU microcode for processor family 17h: sig 0x008a0f00;
- Update AMD CPU microcode for processor family 19h: sig 0x00a00f10,
sig 0x00a00f11, sig 0x00a00f12;
- Update AMD CPU microcode for processor family 17h: sig 0x00830f10;
Moderate
TuxCare License Agreement
CVE-2023-20593
cpe:/o:centos:linux:6:GA
amanda: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-37705: fix tar option filtering
- CVE-2023-30577: introduce tar option allow list
Important
TuxCare License Agreement
CVE-2022-37705
CVE-2023-30577
cpe:/o:centos:linux:6:GA
samba: Fix of CVE-2022-2127
Community Enterprise Operating System 6
- CVE-2022-2127: Fix oud-of-bounds read triggered by maliciously request
Moderate
TuxCare License Agreement
CVE-2022-2127
cpe:/o:centos:linux:6:GA
php: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-3823: Fix external entity loading in XML without enabling by
sanitizing libxml2 globals before parsing
- CVE-2023-3824: Fix buffer mismanagement in phar_dir_read()
Low
TuxCare License Agreement
CVE-2023-3823
CVE-2023-3824
cpe:/o:centos:linux:6:GA
microcode_ctl: Fix of CVE-2022-40982
Community Enterprise Operating System 6
- Update Intel CPU microcode to microcode-20230808 release addresses
CVE-2022-40982:
- Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-ba-03/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-ba-03/0xe0 microcode (in microcode.dat) at revision 0x4119;
- Addition of 06-be-00/0x11 microcode (in microcode.dat) at revision 0x11;
- Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-ba-03/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-ba-03/0xc0 microcode (in microcode.dat) at revision 0x4112;
- Removal of 06-be-00/0x01 microcode (in microcode.dat) at revision 0x10;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode (in microcode.dat) from
revision 0x1000171 up to 0x1000181;
- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
microcode.dat) from revision 0x2006f05 up to 0x2007006;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode (in microcode.dat) from
revision 0x4003501 up to 0x4003604;
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
from revision 0x5003501 up to 0x5003604;
- Update of 06-55-0b/0xbf (CPX-SP A1) microcode (in microcode.dat) from
revision 0x7002601 up to 0x7002703;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in microcode.dat) from
revision 0xd000390 up to 0xd0003a5;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
revision 0xba up to 0xbc;
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat) from
revision 0xaa up to 0xac;
- Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in microcode.dat) from
revision 0x2a up to 0x2c;
- Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in microcode.dat) from
revision 0x44 up to 0x46;
- Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in microcode.dat) from
revision 0xf2 up to 0xf4;
- Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in microcode.dat)
from revision 0xf2 up to 0xf4;
- Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
microcode.dat) from revision 0xf2 up to 0xf4;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in microcode.dat) from
revision 0xf2 up to 0xf4;
- Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
(in microcode.dat) from revision 0xf6 up to 0xf8;
- Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
0x2c0001d1 up to 0x2c000271;
- Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
0x2b000461 up to 0x2b0004b1;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
0x2c0001d1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
0x2b000461;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
- Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
- Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
- Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
- Update of 06-9a-04/0x80 microcode (in microcode.dat) from revision 0x42a up
to 0x42c;
- Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
- Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
- Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
- Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
- Update of 06-9a-04/0x80 microcode (in microcode.dat) from revision 0x42a up
to 0x42c;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
microcode.dat) from revision 0xf2 up to 0xf4;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
from revision 0xf2 up to 0xf4;
- Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in microcode.dat) from
revision 0xf2 up to 0xf4;
- Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in microcode.dat)
from revision 0xf2 up to 0xf4;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
from revision 0xf8 up to 0xfa;
- Update of 06-a5-02/0x20 (CML-H R1) microcode (in microcode.dat) from
revision 0xf6 up to 0xf8;
- Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
revision 0xf6 up to 0xf8;
- Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat) from
revision 0xf6 up to 0xf8;
- Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
revision 0xf6 up to 0xf8;
- Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat) from
revision 0xf6 up to 0xf8;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode (in microcode.dat) from
revision 0x58 up to 0x59;
- Update of 06-b7-01/0x32 microcode (in microcode.dat) from revision 0x113 up
to 0x119;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
- Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
- Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
to 0x2e;
Moderate
TuxCare License Agreement
CVE-2022-40982
cpe:/o:centos:linux:6:GA
busybox: Fix of CVE-2022-48174
Community Enterprise Operating System 6
- CVE-2022-48174: fix unlikely stack overflow
- testsuite was enabled
Critical
TuxCare License Agreement
CVE-2022-48174
cpe:/o:centos:linux:6:GA
binutils: Fix of 3 CVEs
Community Enterprise Operating System 6
- CVE-2022-47673: Fix multiple out of bound reads which may cause a DoS
- CVE-2022-47695: Fix NULL pointer segmentation fault which may cause a DoS
- CVE-2022-47696: Fix read of unitialized field which may cause a DoS
Important
TuxCare License Agreement
CVE-2021-46174
CVE-2022-47673
CVE-2022-47695
CVE-2022-47696
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-4733
Community Enterprise Operating System 6
- CVE-2023-4733: verify oldwin pointer after reset_VIsual()
Important
TuxCare License Agreement
CVE-2023-4733
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2023-4736
Community Enterprise Operating System 6
- CVE-2023-4736: improve search path to avoid run an executable in untrusted dir
Important
TuxCare License Agreement
CVE-2023-4781
CVE-2023-4751
CVE-2023-4736
CVE-2023-4752
cpe:/o:centos:linux:6:GA
libssh2: Fix of CVE-2020-22218
Community Enterprise Operating System 6
- CVE-2020-22218: doing total_num zero length check
Important
TuxCare License Agreement
CVE-2020-22218
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2022-48565
Community Enterprise Operating System 6
- CVE-2022-48565: Reject XML entity declarations in plist files
Critical
TuxCare License Agreement
CVE-2022-48565
cpe:/o:centos:linux:6:GA
binutils: Fix of CVE-2020-19726
Community Enterprise Operating System 6
- CVE-2020-19726: Fix an illegal memory access in the BFD library which can be
triggered by attempting to parse a corrupt PE format file
Important
TuxCare License Agreement
CVE-2020-19726
cpe:/o:centos:linux:6:GA
libwebp: Fix of CVE-2023-1999
Community Enterprise Operating System 6
- CVE-2023-1999: avoids a double free
Important
TuxCare License Agreement
CVE-2023-1999
cpe:/o:centos:linux:6:GA
bind: Fix of CVE-2023-3341
Community Enterprise Operating System 6
- CVE-2023-3341: Limit isccc_cc_fromwire recursion depth
Important
TuxCare License Agreement
CVE-2023-3341
cpe:/o:centos:linux:6:GA
curl: Fix of CVE-2023-38546
Community Enterprise Operating System 6
- CVE-2023-38546: cookie: remove unnecessary struct fields
- Rebuild expired test certificates
Moderate
TuxCare License Agreement
CVE-2023-38546
cpe:/o:centos:linux:6:GA
exim: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-42114: fix possible OOB read in SPA authenticator
- CVE-2023-42116: fix possible OOB write in SPA authenticator
Important
TuxCare License Agreement
CVE-2023-42114
CVE-2023-42116
cpe:/o:centos:linux:6:GA
quagga: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-41360: don't read the first byte of ORF header if we are ahead of
stream
- CVE-2023-41358: do not process NLRIs if the attribute length is zero
Critical
TuxCare License Agreement
CVE-2023-41358
CVE-2023-41360
cpe:/o:centos:linux:6:GA
nginx: Fix of CVE-2023-44487
Community Enterprise Operating System 6
- CVE-2023-44487: HTTP/2 - per-iteration stream handling limit
Important
TuxCare License Agreement
CVE-2023-44487
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2022-48560
Community Enterprise Operating System 6
- CVE-2022-48560: Fix SIGSEGV in Python via heappushpop in heapq
Important
TuxCare License Agreement
CVE-2022-48560
cpe:/o:centos:linux:6:GA
zlib: Fix of CVE-2023-45853
Community Enterprise Operating System 6
- CVE-2023-45853: Reject overflows of zip header fields in minizip
Critical
TuxCare License Agreement
CVE-2023-45853
cpe:/o:centos:linux:6:GA
vim: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-5441: segfault in exmode
- CVE-2023-5344: buffer overflow in trunc_string()
Important
TuxCare License Agreement
CVE-2023-5441
CVE-2023-5344
cpe:/o:centos:linux:6:GA
libxml2: Fix of CVE-2016-4658
Community Enterprise Operating System 6
- CVE-2016-4658: disallow namespace nodes in XPointer ranges
Critical
TuxCare License Agreement
CVE-2016-4658
cpe:/o:centos:linux:6:GA
exim: Fix of CVE-2022-3559
Community Enterprise Operating System 6
- CVE-2022-3559: Fix $regex<n> use-after-free
Important
TuxCare License Agreement
CVE-2022-3559
cpe:/o:centos:linux:6:GA
squid: Fix of CVE-2023-46847
Community Enterprise Operating System 6
- CVE-2023-46847: Fix stack buffer overflow when parsing Digest Authorization
Important
TuxCare License Agreement
CVE-2023-46847
cpe:/o:centos:linux:6:GA
kernel: Fix of 10 CVEs
Community Enterprise Operating System 6
- openvswitch: fix OOB access in reserve_sfa_size() {CVE-2022-2639}
- xen/blkfront: fix leaking data in shared pages {CVE-2022-26365}
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() {CVE-2020-36386}
- btrfs: only search for left_info if there is no right_info in try_merge_free_space {CVE-2019-19448}
- filldir[64]: remove WARN_ON_ONCE() for bad directory entries {CVE-2019-10220}
- Make filldir[64]() verify the directory entry filename is valid {CVE-2019-10220}
- ath9k: release allocated buffer if timed out {CVE-2019-19074}
- net: sched: sch_qfq: prevent slab-out-of-bounds in {CVE-2023-31436}
- memstick: r592: Fix UAF bug in r592_remove due to race {CVE-2023-3141}
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid {CVE-2023-23559}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}
Important
TuxCare License Agreement
CVE-2022-0850
CVE-2019-10220
CVE-2019-19074
CVE-2019-19448
CVE-2020-36386
CVE-2022-26365
CVE-2023-31436
CVE-2023-3141
CVE-2023-23559
CVE-2022-2639
cpe:/o:centos:linux:6:GA
samba: Fix of CVE-2023-3961
Community Enterprise Operating System 6
- CVE-2023-3961: Fix a path traversal out of the socket directory
- fix chagelog's versions
Critical
TuxCare License Agreement
CVE-2023-3961
cpe:/o:centos:linux:6:GA
exim: Fix of CVE-2023-42117
Community Enterprise Operating System 6
- CVE-2023-42117: fix string_is_ip_address()
Important
TuxCare License Agreement
CVE-2023-42117
cpe:/o:centos:linux:6:GA
squid34: Fix of CVE-2023-46724
Community Enterprise Operating System 6
- CVE-2023-46724: Fix validation of certificates with CN=*
Important
TuxCare License Agreement
CVE-2023-46724
cpe:/o:centos:linux:6:GA
squid34: Fix of CVE-2023-46847
Community Enterprise Operating System 6
- CVE-2023-46847: Fix stack buffer overflow when parsing Digest Authorization
Important
TuxCare License Agreement
CVE-2023-46847
cpe:/o:centos:linux:6:GA
libksba: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2022-3515: detect a possible overflow directly in the TLV parser
- CVE-2022-47629: fix an integer overflow in the CRL signature parser
Critical
TuxCare License Agreement
CVE-2022-47629
CVE-2022-3515
cpe:/o:centos:linux:6:GA
microcode_ctl: Fix of CVE-2023-23583
Community Enterprise Operating System 6
- Update Intel CPU microcode to microcode-20231114 release, addresses
CVE-2023-23583 (INTEL-SA-00950):
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in 06-6a-06) from revision
0xd0003a5 up to 0xd0003b9;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode (in 06-6c-01) from revision
0x1000230 up to 0x1000268;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in 06-7e-05) from revision
0xbc up to 0xc2;
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in 06-8c-01) from
revision 0xac up to 0xb4;
- Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in 06-8c-02) from revision
0x2c up to 0x34;
- Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in 06-8d-01) from revision
0x46 up to 0x4e;
- Update of 06-8f-04/0x10 microcode (in 06-8f-04) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-04) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-04) from revision
0x2c000271 up to 0x2c000290;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-04) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-06/0x10 microcode (in 06-8f-04) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-04) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-04) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
0x2c000290;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
0x2c000290;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
0x2c000271;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
revision 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
revision 0x2b0004d0;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
0x2b0004b1;
- Update of 06-8f-04/0x10 microcode (in 06-8f-05) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-05) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-05) from revision
0x2c000271 up to 0x2c000290;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-05) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-06/0x10 microcode (in 06-8f-05) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-05) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-05) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
0x2c000290;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
0x2c000290;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
0x2c000271;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
revision 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
revision 0x2b0004d0;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
0x2b0004b1;
- Update of 06-8f-04/0x10 microcode (in 06-8f-06) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-06) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-06) from revision
0x2c000271 up to 0x2c000290;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-06) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-06/0x10 microcode (in 06-8f-06) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-06) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-06) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
0x2c000290;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
0x2c000290;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
0x2c000271;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
revision 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
revision 0x2b0004d0;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
0x2b0004b1;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-07) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-07) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-07) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-07) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
revision 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
revision 0x2b0004d0;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
0x2b0004b1;
- Update of 06-8f-04/0x10 microcode (in 06-8f-08) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-08) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-08) from revision
0x2c000271 up to 0x2c000290;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-08) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-06/0x10 microcode (in 06-8f-08) from revision 0x2c000271 up
to 0x2c000290;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-08) from revision
0x2b0004b1 up to 0x2b0004d0;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-08) from
revision 0x2b0004b1 up to 0x2b0004d0;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
0x2c000290;
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
0x2c000290;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
0x2c000271;
- Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
0x2c000271;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
revision 0x2b0004d0;
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
revision 0x2b0004d0;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
0x2b0004b1;
- Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
0x2b0004b1;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
revision 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
revision 0x32;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
revision 0x2e;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
revision 0x2e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-02) from
revision 0x2e up to 0x32;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2e
up to 0x32;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2e
up to 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
revision 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
revision 0x32;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
revision 0x2e;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
revision 0x2e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-05) from
revision 0x2e up to 0x32;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2e
up to 0x32;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2e
up to 0x32;
- Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
revision 0x430;
- Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
revision 0x430;
- Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
revision 0x42c;
- Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
revision 0x42c;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-03) from
revision 0x42c up to 0x430;
- Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
revision 0x430;
- Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
revision 0x430;
- Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
revision 0x42c;
- Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
revision 0x42c;
- Update of 06-9a-04/0x40 (AZB A0) microcode (in 06-9a-04) from revision 0x4
up to 0x5;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-04) from
revision 0x42c up to 0x430;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode (in 06-a7-01) from revision
0x59 up to 0x5d;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode (in 06-b7-01) from revision
0x119 up to 0x11d;
- Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
revision 0x411c;
- Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
revision 0x411c;
- Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
revision 0x4119;
- Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
revision 0x4119;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in 06-ba-02) from
revision 0x4119 up to 0x411c;
- Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
revision 0x411c;
- Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
revision 0x411c;
- Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
revision 0x4119;
- Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
revision 0x4119;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in 06-ba-03) from
revision 0x4119 up to 0x411c;
- Update of 06-be-00/0x11 (ADL-N A0) microcode (in 06-be-00) from revision
0x11 up to 0x12;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
revision 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
revision 0x32;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
revision 0x2e;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
revision 0x2e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-02) from
revision 0x2e up to 0x32;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2e
up to 0x32;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2e
up to 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
revision 0x32;
- Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
revision 0x32;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
revision 0x2e;
- Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
revision 0x2e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-05) from
revision 0x2e up to 0x32;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2e
up to 0x32;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2e
up to 0x32.
Important
TuxCare License Agreement
CVE-2023-23583
cpe:/o:centos:linux:6:GA
squid: Fix of CVE-2023-46728
Community Enterprise Operating System 6
- CVE-2023-46728: Remove support for Gopher protocol
- Enable test-suite
Important
TuxCare License Agreement
CVE-2023-46728
cpe:/o:centos:linux:6:GA
squid34: Fix of CVE-2023-46728
Community Enterprise Operating System 6
- CVE-2023-46728: Remove support for Gopher protocol
Important
TuxCare License Agreement
CVE-2023-46728
cpe:/o:centos:linux:6:GA
haproxy: Fix of CVE-2023-45539
Community Enterprise Operating System 6
- CVE-2023-45539: do not accept '#' as part of the URI component
Important
TuxCare License Agreement
CVE-2023-45539
cpe:/o:centos:linux:6:GA
squid34: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-49285: Fix date parsing in RFC 1123 to prevent Buffer OverRead
- CVE-2023-49286: Fix DoS attack against Helper process management
Important
TuxCare License Agreement
CVE-2023-49285
CVE-2023-49286
cpe:/o:centos:linux:6:GA
squid: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-49285: Fix date parsing in RFC 1123 to prevent Buffer OverRead
- CVE-2023-49286: Fix DoS attack against Helper process management
Important
TuxCare License Agreement
CVE-2023-49286
CVE-2023-49285
cpe:/o:centos:linux:6:GA
openssh: Fix of CVE-2023-51385
Community Enterprise Operating System 6
- CVE-2023-51385: ban user/hostnames with most shell metacharacters in
command line
Critical
TuxCare License Agreement
CVE-2023-51385
cpe:/o:centos:linux:6:GA
python: Fix of CVE-2023-40217
Community Enterprise Operating System 6
- CVE-2023-40217: Fix TLS handshake bypass
Moderate
TuxCare License Agreement
CVE-2023-40217
cpe:/o:centos:linux:6:GA
kernel: Fix of 13 CVEs
Community Enterprise Operating System 6
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896}
- tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
Important
TuxCare License Agreement
CVE-2023-3567
CVE-2023-6606
CVE-2021-45485
CVE-2023-6932
CVE-2023-4623
CVE-2023-40283
CVE-2023-3776
CVE-2023-3111
CVE-2022-42896
CVE-2022-3566
CVE-2022-45934
CVE-2023-1670
CVE-2023-3268
cpe:/o:centos:linux:6:GA
squid34: Fix of CVE-2023-50269
Community Enterprise Operating System 6
- CVE-2023-50269: Limit the number of allowed X-Forwarded-For hops to prevent DoS
Important
TuxCare License Agreement
CVE-2023-50269
cpe:/o:centos:linux:6:GA
squid: Fix of CVE-2023-50269
Community Enterprise Operating System 6
- CVE-2023-50269: Limit the number of allowed X-Forwarded-For hops to prevent DoS
Important
TuxCare License Agreement
CVE-2023-50269
cpe:/o:centos:linux:6:GA
java-1.8.0-openjdk: Fix of 8 CVEs
Community Enterprise Operating System 6
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u402-b06. That fixes following CVEs:
- CVE-2024-20918: Array out-of-bounds access due to missing range check in C1 compiler
- CVE-2024-20919: JVM class file verifier flaw allows unverified bytecode execution
- CVE-2024-20921: Range check loop optimization issue
- CVE-2024-20926: Arbitrary Java code execution in Nashorn
- CVE-2024-20945: Logging of digital signature private keys
- CVE-2024-20952: RSA padding issue and timing side-channel attack against TLS
- CVE-2023-22067: IOR deserialization issue in CORBA (fixed in jdk8u392)
- CVE-2023-22081: Certificate path validation issue during client authentication (fixed in jdk8u392)
- Adapt pr2462 patch to the new sources
Important
TuxCare License Agreement
CVE-2024-20945
CVE-2024-20952
CVE-2024-20918
CVE-2024-20919
CVE-2024-20926
CVE-2023-22081
CVE-2024-20921
CVE-2023-22067
cpe:/o:centos:linux:6:GA
sudo: Fix of CVE-2023-42465
Community Enterprise Operating System 6
- CVE-2023-42465: make sudo less vulnerable to ROWHAMMER attacks
Important
TuxCare License Agreement
CVE-2023-42465
cpe:/o:centos:linux:6:GA
libxml2: Fix of CVE-2024-25062
Community Enterprise Operating System 6
- CVE-2024-25062: Fix xmlValidatePopElement use-after-free in XML Reader
interface with DTD validation and XInclude expansion enabled
- test suite was partially activated
Important
TuxCare License Agreement
CVE-2024-25062
cpe:/o:centos:linux:6:GA
kernel: Fix of 7 CVEs
Community Enterprise Operating System 6
- KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653) {CVE-2021-3653}
- xen/netfront: fix leaking data in shared pages {CVE-2022-33740}
- xfs: fix up non-directory creation in SGID directories {CVE-2021-4037}
- net_sched: cls_route: remove from list when handle is 0 {CVE-2022-2588}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043}
Important
TuxCare License Agreement
CVE-2023-51043
CVE-2023-6915
CVE-2022-2588
CVE-2023-51780
CVE-2021-4037
CVE-2022-33740
cpe:/o:centos:linux:6:GA
vim: Fix of CVE-2024-22667
Community Enterprise Operating System 6
- CVE-2024-22667: addressing a potential stack-buffer-overflow in option
processing functions
Important
TuxCare License Agreement
CVE-2024-22667
cpe:/o:centos:linux:6:GA
bind: Fix of 2 CVEs
Community Enterprise Operating System 6
- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3
- Enable internal tests by default
Important
TuxCare License Agreement
CVE-2023-50868
CVE-2023-50387
cpe:/o:centos:linux:6:GA
squid: Fix of CVE-2024-25617
Community Enterprise Operating System 6
- CVE-2024-25617: Fix denial of service in HTTP header parser
Important
TuxCare License Agreement
CVE-2024-25617
cpe:/o:centos:linux:6:GA
/etc/els-release
CentOS release 6\.10 \(Final, ELS by Cloudlinux\)
1
sudo
sudo-devel
bash
bash-doc
gzip
bind
bind-chroot
bind-devel
bind-libs
bind-sdb
bind-utils
busybox
busybox-petitboot
httpd
httpd-devel
httpd-manual
httpd-tools
mod_ssl
curl
libcurl
libcurl-devel
cyrus-imapd
cyrus-imapd-devel
cyrus-imapd-utils
dhclient
dhcp
dhcp-common
dhcp-devel
dovecot
dovecot-devel
dovecot-mysql
dovecot-pgsql
dovecot-pigeonhole
gd
gd-devel
gd-progs
glib2
glib2-devel
glib2-doc
glib2-static
glibc
glibc-common
glibc-devel
glibc-headers
glibc-static
glibc-utils
nscd
hivex
hivex-devel
ocaml-hivex
ocaml-hivex-devel
perl-hivex
python-hivex
kernel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-firmware
kernel-headers
perf
python-perf
kernel-abi-whitelists
kernel-doc
cyrus-sasl
cyrus-sasl-devel
cyrus-sasl-gssapi
cyrus-sasl-ldap
cyrus-sasl-lib
cyrus-sasl-md5
cyrus-sasl-ntlm
cyrus-sasl-plain
cyrus-sasl-sql
log4j
log4j-javadoc
log4j-manual
nginx
nginx-all-modules
nginx-filesystem
nginx-mod-http-geoip
nginx-mod-http-image-filter
nginx-mod-http-perl
nginx-mod-http-xslt-filter
nginx-mod-mail
nginx-mod-stream
openssh
openssh-askpass
openssh-clients
openssh-ldap
openssh-server
pam_ssh_agent_auth
ntp
ntp-doc
ntp-perl
ntpdate
openssl
openssl-devel
openssl-perl
openssl-static
perl
perl-Archive-Extract
perl-Archive-Tar
perl-CGI
perl-CPAN
perl-CPANPLUS
perl-Compress-Raw-Bzip2
perl-Compress-Raw-Zlib
perl-Compress-Zlib
perl-Digest-SHA
perl-ExtUtils-CBuilder
perl-ExtUtils-Embed
perl-ExtUtils-MakeMaker
perl-ExtUtils-ParseXS
perl-File-Fetch
perl-IO-Compress-Base
perl-IO-Compress-Bzip2
perl-IO-Compress-Zlib
perl-IO-Zlib
perl-IPC-Cmd
perl-Locale-Maketext-Simple
perl-Log-Message
perl-Log-Message-Simple
perl-Module-Build
perl-Module-CoreList
perl-Module-Load
perl-Module-Load-Conditional
perl-Module-Loaded
perl-Module-Pluggable
perl-Object-Accessor
perl-Package-Constants
perl-Params-Check
perl-Parse-CPAN-Meta
perl-Pod-Escapes
perl-Pod-Simple
perl-Term-UI
perl-Test-Harness
perl-Test-Simple
perl-Time-HiRes
perl-Time-Piece
perl-core
perl-devel
perl-libs
perl-parent
perl-suidperl
perl-version
python
python-devel
python-libs
python-test
python-tools
tkinter
php
php-bcmath
php-cli
php-common
php-dba
php-devel
php-embedded
php-enchant
php-fpm
php-gd
php-imap
php-intl
php-ldap
php-mbstring
php-mysql
php-odbc
php-pdo
php-pgsql
php-process
php-pspell
php-recode
php-snmp
php-soap
php-tidy
php-xml
php-xmlrpc
php-zts
quagga
quagga-contrib
quagga-devel
nss
nss-devel
nss-pkcs11-devel
nss-sysinit
nss-tools
libxml2
libxml2-devel
libxml2-python
libxml2-static
rsync
rsyslog
rsyslog-gnutls
rsyslog-gssapi
rsyslog-mysql
rsyslog-pgsql
rsyslog-relp
rsyslog-snmp
vim-X11
vim-common
vim-enhanced
vim-filesystem
vim-minimal
minizip
minizip-devel
zlib
zlib-devel
zlib-static
java-1.8.0-openjdk
java-1.8.0-openjdk-debug
java-1.8.0-openjdk-demo
java-1.8.0-openjdk-demo-debug
java-1.8.0-openjdk-devel
java-1.8.0-openjdk-devel-debug
java-1.8.0-openjdk-headless
java-1.8.0-openjdk-headless-debug
java-1.8.0-openjdk-javadoc
java-1.8.0-openjdk-javadoc-debug
java-1.8.0-openjdk-src
java-1.8.0-openjdk-src-debug
squid34
microcode_ctl
xterm
binutils
binutils-devel
openvpn
openvpn-devel
openldap
openldap-clients
openldap-devel
openldap-servers
openldap-servers-sql
squid
ImageMagick
ImageMagick-c++
ImageMagick-c++-devel
ImageMagick-devel
ImageMagick-doc
ImageMagick-perl
polkit
polkit-desktop-policy
polkit-devel
polkit-docs
screen
exim
exim-greylist
exim-mon
exim-mysql
exim-pgsql
expat
expat-devel
java-1.7.0-openjdk
java-1.7.0-openjdk-demo
java-1.7.0-openjdk-devel
java-1.7.0-openjdk-javadoc
java-1.7.0-openjdk-src
lemon
sqlite
sqlite-devel
sqlite-doc
sqlite-tcl
krb5-devel
krb5-libs
krb5-pkinit-openssl
krb5-server
krb5-server-ldap
krb5-workstation
libkadm5
emacs-git
emacs-git-el
git
git-all
git-cvs
git-daemon
git-email
git-gui
git-svn
gitk
gitweb
perl-Git
tar
sysstat
amanda
amanda-client
amanda-devel
amanda-server
libsmbclient
libsmbclient-devel
samba
samba-client
samba-common
samba-doc
samba-domainjoin-gui
samba-glusterfs
samba-swat
samba-winbind
samba-winbind-clients
samba-winbind-devel
samba-winbind-krb5-locator
libssh2
libssh2-devel
libssh2-docs
libwebp
libwebp-devel
libwebp-java
libwebp-tools
libksba
libksba-devel
haproxy
x86_64
0:1.8.6p3-30.el6.cloudlinux.els6
0946fca2c105b9de
8c55a6628608cb71
i686|x86_64
0:1.8.6p3-30.el6.cloudlinux.els6
x86_64
0:1.8.6p3-32.el6.cloudlinux.els
i686|x86_64
0:1.8.6p3-32.el6.cloudlinux.els
x86_64
0:4.1.2-48.el6.tuxcare.els1
x86_64
0:1.3.12-24.el6.tuxcare.els1
x86_64
32:9.8.2-0.68.rc16_10.9.cloudlinux.els
i686|x86_64
32:9.8.2-0.68.rc16_10.9.cloudlinux.els
x86_64
33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els
x86_64
33:9.8.2-0.68.rc1.el6.11.cloudlinux.els
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.cloudlinux.els
x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els4
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els4
x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els5
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els5
x86_64
1:1.15.1-21.el6_6.tuxcare.els1
x86_64
0:2.2.15-71.el6.cloudlinux.els
i686|x86_64
0:2.2.15-71.el6.cloudlinux.els
0:2.2.15-71.el6.cloudlinux.els
x86_64
1:2.2.15-71.el6.cloudlinux.els
x86_64
0:2.2.15-72.el6.cloudlinux.els
i686|x86_64
0:2.2.15-72.el6.cloudlinux.els
0:2.2.15-72.el6.cloudlinux.els
x86_64
1:2.2.15-72.el6.cloudlinux.els
x86_64
0:2.2.15-72.el6.tuxcare.els4
i686|x86_64
0:2.2.15-72.el6.tuxcare.els4
0:2.2.15-72.el6.tuxcare.els4
x86_64
1:2.2.15-72.el6.tuxcare.els4
x86_64
0:2.2.15-72.el6.tuxcare.els5
i686|x86_64
0:2.2.15-72.el6.tuxcare.els5
0:2.2.15-72.el6.tuxcare.els5
x86_64
1:2.2.15-72.el6.tuxcare.els5
x86_64
0:7.19.7-55.el6.cloudlinux.els6
x86_64
0:7.19.7-56.el6.cloudlinux.els6
i686|x86_64
0:7.19.7-56.el6.cloudlinux.els6
x86_64
0:7.19.7-57.el6.cloudlinux.els
i686|x86_64
0:7.19.7-57.el6.cloudlinux.els
x86_64
0:7.19.7-58.el6.cloudlinux.els
i686|x86_64
0:7.19.7-58.el6.cloudlinux.els
x86_64
0:7.19.7-59.el6.cloudlinux.els
i686|x86_64
0:7.19.7-59.el6.cloudlinux.els
x86_64
0:7.19.7-59.el6.tuxcare.els6
i686|x86_64
0:7.19.7-59.el6.tuxcare.els6
x86_64
0:2.3.16-15.el6.tuxcare.els1
i686|x86_64
0:2.3.16-15.el6.tuxcare.els1
x86_64
12:4.1.1-64.P1.el6.cloudlinux.els
i686|x86_64
12:4.1.1-64.P1.el6.cloudlinux.els
i686|x86_64
1:2.0.9-23.el6.cloudlinux.els
x86_64
1:2.0.9-23.el6.cloudlinux.els
i686|x86_64
0:2.0.35-12.el6.cloudlinux.els
x86_64
0:2.0.35-12.el6.cloudlinux.els
i686|x86_64
0:2.28.8-12.el6.cloudlinux.els
0:2.28.8-12.el6.cloudlinux.els
x86_64
0:2.28.8-12.el6.cloudlinux.els
i686|x86_64
0:2.28.8-12.el6.tuxcare.els3
0:2.28.8-12.el6.tuxcare.els3
x86_64
0:2.28.8-12.el6.tuxcare.els3
i686|x86_64
0:2.12-2.213.el6.cloudlinux.els
x86_64
0:2.12-2.213.el6.cloudlinux.els
i686|x86_64
0:2.12-2.215.el6.cloudlinux.els
x86_64
0:2.12-2.215.el6.cloudlinux.els
i686|x86_64
0:2.12-2.215.el6.tuxcare.els6
x86_64
0:2.12-2.215.el6.tuxcare.els6
i686|x86_64
0:2.12-2.215.el6.tuxcare.els7
x86_64
0:2.12-2.215.el6.tuxcare.els7
i686|x86_64
0:1.3.3-4.4.el6.cloudlinux.els
x86_64
0:1.3.3-4.4.el6.cloudlinux.els
(^2\.6\.32\-754\.35\.[2-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.2.el6
i686|x86_64
0:2.6.32-754.35.2.el6
(^2\.6\.32\-754\.35\.[3-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.3.el6
i686|x86_64
0:2.6.32-754.35.3.el6
(^2\.6\.32\-754\.35\.[5-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.5.el6
i686|x86_64
0:2.6.32-754.35.5.el6
0:2.6.32-754.35.6.el6
(^2\.6\.32\-754\.35\.[7-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.7.el6
i686|x86_64
0:2.6.32-754.35.7.el6
(^2\.6\.32\-754\.35\.8\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6
i686|x86_64
0:2.6.32-754.35.8.el6
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{2,}).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els10
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els10
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{2,}|9).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els9
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els9
x86_64
0:2.1.23-15.el6_6.2.tuxcare.els1
i686|x86_64
0:2.1.23-15.el6_6.2.tuxcare.els1
x86_64
0:1.2.14-6.4.el6.tuxcare.els1
x86_64
0:1.2.14-6.4.el6.tuxcare.els2
x86_64
0:1.2.14-6.4.el6.tuxcare.els3
x86_64
0:1.2.14-6.4.el6.tuxcare.els4
x86_64
0:1.10.3-3.el6.cloudlinux.els
0:1.10.3-3.el6.cloudlinux.els
x86_64
0:1.10.3-4.el6.cloudlinux.els
0:1.10.3-4.el6.cloudlinux.els
x86_64
0:1.10.3-4.el6.tuxcare.els4
0:1.10.3-4.el6.tuxcare.els4
x86_64
0:5.3p1-125.el6.tuxcare.els1
i686|x86_64
0:0.9.3-125.el6.tuxcare.els1
x86_64
0:5.3p1-125.el6.tuxcare.els2
i686|x86_64
0:0.9.3-125.el6.tuxcare.els2
x86_64
0:5.3p1-125.el6.tuxcare.els3
i686|x86_64
0:0.9.3-125.el6.tuxcare.els3
x86_64
0:4.2.6p5-16.el6.cloudlinux.els
0:4.2.6p5-16.el6.cloudlinux.els
x86_64
0:1.0.1e-59.el6.cloudlinux.els6
i686|x86_64
0:1.0.1e-60.el6.cloudlinux.els6
x86_64
0:1.0.1e-60.el6.cloudlinux.els6
i686|x86_64
0:1.0.1e-61.el6.cloudlinux.els
x86_64
0:1.0.1e-61.el6.cloudlinux.els
i686|x86_64
0:1.0.1e-62.el6.cloudlinux.els
x86_64
0:1.0.1e-62.el6.cloudlinux.els
i686|x86_64
0:1.0.1e-63.el6.tuxcare.els6
x86_64
0:1.0.1e-63.el6.tuxcare.els6
i686|x86_64
0:1.0.1e-63.el6.tuxcare.els7
x86_64
0:1.0.1e-63.el6.tuxcare.els7
x86_64
4:5.10.1-146.el6.tuxcare.els3
x86_64
1:0.38-146.el6.tuxcare.els3
x86_64
0:1.58-146.el6.tuxcare.els3
x86_64
0:3.51-146.el6.tuxcare.els3
x86_64
0:1.9402-146.el6.tuxcare.els3
x86_64
0:0.88-146.el6.tuxcare.els3
x86_64
0:2.021-146.el6.tuxcare.els3
x86_64
1:2.021-146.el6.tuxcare.els3
x86_64
1:5.47-146.el6.tuxcare.els3
x86_64
1:0.27-146.el6.tuxcare.els3
x86_64
0:1.28-146.el6.tuxcare.els3
x86_64
0:6.55-146.el6.tuxcare.els3
x86_64
1:2.2003.0-146.el6.tuxcare.els3
x86_64
0:0.26-146.el6.tuxcare.els3
x86_64
1:1.09-146.el6.tuxcare.els3
x86_64
1:0.56-146.el6.tuxcare.els3
x86_64
1:0.18-146.el6.tuxcare.els3
x86_64
1:0.02-146.el6.tuxcare.els3
x86_64
0:0.04-146.el6.tuxcare.els3
x86_64
1:0.3500-146.el6.tuxcare.els3
x86_64
0:2.18-146.el6.tuxcare.els3
x86_64
1:0.16-146.el6.tuxcare.els3
x86_64
0:0.30-146.el6.tuxcare.els3
x86_64
1:3.90-146.el6.tuxcare.els3
x86_64
1:0.34-146.el6.tuxcare.els3
x86_64
1:0.26-146.el6.tuxcare.els3
x86_64
1:1.40-146.el6.tuxcare.els3
x86_64
1:1.04-146.el6.tuxcare.els3
x86_64
1:3.13-146.el6.tuxcare.els3
x86_64
0:0.20-146.el6.tuxcare.els3
x86_64
0:3.17-146.el6.tuxcare.els3
x86_64
0:0.92-146.el6.tuxcare.els3
x86_64
4:1.9721-146.el6.tuxcare.els3
x86_64
0:1.15-146.el6.tuxcare.els3
x86_64
0:5.10.1-146.el6.tuxcare.els3
i686|x86_64
4:5.10.1-146.el6.tuxcare.els3
x86_64
1:0.221-146.el6.tuxcare.els3
x86_64
3:0.77-146.el6.tuxcare.els3
x86_64
4:5.10.1-145.el6.cloudlinux.els
x86_64
1:0.38-145.el6.cloudlinux.els
x86_64
0:1.58-145.el6.cloudlinux.els
x86_64
0:3.51-145.el6.cloudlinux.els
x86_64
0:1.9402-145.el6.cloudlinux.els
x86_64
0:0.88-145.el6.cloudlinux.els
x86_64
0:2.021-145.el6.cloudlinux.els
x86_64
1:2.021-145.el6.cloudlinux.els
x86_64
1:5.47-145.el6.cloudlinux.els
x86_64
1:0.27-145.el6.cloudlinux.els
x86_64
0:1.28-145.el6.cloudlinux.els
x86_64
0:6.55-145.el6.cloudlinux.els
x86_64
1:2.2003.0-145.el6.cloudlinux.els
x86_64
0:0.26-145.el6.cloudlinux.els
x86_64
1:1.09-145.el6.cloudlinux.els
x86_64
1:0.56-145.el6.cloudlinux.els
x86_64
1:0.18-145.el6.cloudlinux.els
x86_64
1:0.02-145.el6.cloudlinux.els
x86_64
0:0.04-145.el6.cloudlinux.els
x86_64
1:0.3500-145.el6.cloudlinux.els
x86_64
0:2.18-145.el6.cloudlinux.els
x86_64
1:0.16-145.el6.cloudlinux.els
x86_64
0:0.30-145.el6.cloudlinux.els
x86_64
1:3.90-145.el6.cloudlinux.els
x86_64
1:0.34-145.el6.cloudlinux.els
x86_64
1:0.26-145.el6.cloudlinux.els
x86_64
1:1.40-145.el6.cloudlinux.els
x86_64
1:1.04-145.el6.cloudlinux.els
x86_64
1:3.13-145.el6.cloudlinux.els
x86_64
0:0.20-145.el6.cloudlinux.els
x86_64
0:3.17-145.el6.cloudlinux.els
x86_64
0:0.92-145.el6.cloudlinux.els
x86_64
4:1.9721-145.el6.cloudlinux.els
x86_64
0:1.15-145.el6.cloudlinux.els
x86_64
0:5.10.1-145.el6.cloudlinux.els
i686|x86_64
4:5.10.1-145.el6.cloudlinux.els
x86_64
1:0.221-145.el6.cloudlinux.els
x86_64
3:0.77-145.el6.cloudlinux.els
x86_64
4:5.10.1-146.el6.cloudlinux.els
x86_64
1:0.38-146.el6.cloudlinux.els
x86_64
0:1.58-146.el6.cloudlinux.els
x86_64
0:3.51-146.el6.cloudlinux.els
x86_64
0:1.9402-146.el6.cloudlinux.els
x86_64
0:0.88-146.el6.cloudlinux.els
x86_64
0:2.021-146.el6.cloudlinux.els
x86_64
1:2.021-146.el6.cloudlinux.els
x86_64
1:5.47-146.el6.cloudlinux.els
x86_64
1:0.27-146.el6.cloudlinux.els
x86_64
0:1.28-146.el6.cloudlinux.els
x86_64
0:6.55-146.el6.cloudlinux.els
x86_64
1:2.2003.0-146.el6.cloudlinux.els
x86_64
0:0.26-146.el6.cloudlinux.els
x86_64
1:1.09-146.el6.cloudlinux.els
x86_64
1:0.56-146.el6.cloudlinux.els
x86_64
1:0.18-146.el6.cloudlinux.els
x86_64
1:0.02-146.el6.cloudlinux.els
x86_64
0:0.04-146.el6.cloudlinux.els
x86_64
1:0.3500-146.el6.cloudlinux.els
x86_64
0:2.18-146.el6.cloudlinux.els
x86_64
1:0.16-146.el6.cloudlinux.els
x86_64
0:0.30-146.el6.cloudlinux.els
x86_64
1:3.90-146.el6.cloudlinux.els
x86_64
1:0.34-146.el6.cloudlinux.els
x86_64
1:0.26-146.el6.cloudlinux.els
x86_64
1:1.40-146.el6.cloudlinux.els
x86_64
1:1.04-146.el6.cloudlinux.els
x86_64
1:3.13-146.el6.cloudlinux.els
x86_64
0:0.20-146.el6.cloudlinux.els
x86_64
0:3.17-146.el6.cloudlinux.els
x86_64
0:0.92-146.el6.cloudlinux.els
x86_64
4:1.9721-146.el6.cloudlinux.els
x86_64
0:1.15-146.el6.cloudlinux.els
x86_64
0:5.10.1-146.el6.cloudlinux.els
i686|x86_64
4:5.10.1-146.el6.cloudlinux.els
x86_64
1:0.221-146.el6.cloudlinux.els
x86_64
3:0.77-146.el6.cloudlinux.els
i686|x86_64
0:2.6.6-68.el6
x86_64
0:2.6.6-68.el6
i686|x86_64
0:2.6.6-70.el6.cloudlinux.els
x86_64
0:2.6.6-70.el6.cloudlinux.els
i686|x86_64
0:2.6.6-70.el6.tuxcare.els5
x86_64
0:2.6.6-70.el6.tuxcare.els5
i686|x86_64
0:2.6.6-70.el6.tuxcare.els6
x86_64
0:2.6.6-70.el6.tuxcare.els6
i686|x86_64
0:2.6.6-70.el6.tuxcare.els7
x86_64
0:2.6.6-70.el6.tuxcare.els7
x86_64
0:5.3.3-55.el6.cloudlinux.els
x86_64
0:5.3.3-55.el6.tuxcare.els2
x86_64
0:0.99.15-14.el6.tuxcare.els1
i686|x86_64
0:0.99.15-14.el6.tuxcare.els1
i686|x86_64
0:3.44.0-12.el6.tuxcare.els1
x86_64
0:3.44.0-12.el6.tuxcare.els1
i686|x86_64
0:2.7.6-21.el6_8.1.tuxcare.els1
x86_64
0:2.7.6-21.el6_8.1.tuxcare.els1
i686|x86_64
0:2.7.6-21.el6_8.1.tuxcare.els2
x86_64
0:2.7.6-21.el6_8.1.tuxcare.els2
x86_64
0:3.0.6-12.el6.tuxcare.els1
x86_64
0:5.8.10-12.el6.tuxcare.els1
x86_64
3:7.4.629-5.2.el6.tuxcare.els10
x86_64
3:7.4.629-5.2.el6.tuxcare.els11
x86_64
3:7.4.629-5.2.el6.tuxcare.els12
x86_64
3:7.4.629-5.2.el6.tuxcare.els13
x86_64
3:7.4.629-5.2.el6.tuxcare.els14
x86_64
3:7.4.629-5.2.el6.tuxcare.els15
x86_64
3:7.4.629-5.2.el6.tuxcare.els16
x86_64
3:7.4.629-5.2.el6.tuxcare.els18
x86_64
3:7.4.629-5.2.el6.tuxcare.els19
x86_64
3:7.4.629-5.2.el6.tuxcare.els21
x86_64
3:7.4.629-5.2.el6.tuxcare.els22
x86_64
3:7.4.629-5.2.el6.tuxcare.els3
x86_64
3:7.4.629-5.2.el6.tuxcare.els4
x86_64
3:7.4.629-5.2.el6.tuxcare.els5
x86_64
3:7.4.629-5.2.el6.tuxcare.els6
x86_64
3:7.4.629-5.2.el6.tuxcare.els7
x86_64
3:7.4.629-5.2.el6.tuxcare.els8
x86_64
3:7.4.629-5.2.el6.tuxcare.els9
x86_64
2:7.4.629-6.el6.cloudlinux.els
x86_64
2:7.4.629-7.el6.cloudlinux.els
i686|x86_64
0:1.2.3-29.el6.tuxcare.els1
x86_64
0:1.2.3-29.el6.tuxcare.els1
x86_64
1:1.8.0.275.b01-1.el6.cloudlinux.els
1:1.8.0.275.b01-1.el6.cloudlinux.els
x86_64
1:1.8.0.332.b09-1.el6.tuxcare.els1
1:1.8.0.332.b09-1.el6.tuxcare.els1
x86_64
7:3.4.14-16.el6.cloudlinux.els
x86_64
2:1.17-33.34.el6.cloudlinux.els
x86_64
2:1.17-33.37.el6_10.tuxcare.els
x86_64
0:253-2.el6.cloudlinux.els
x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els2
i686|x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els2
x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els3
i686|x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els3
x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els4
i686|x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els4
x86_64
0:2.20.51.0.2-5.49.el6.cloudlinux.els
i686|x86_64
0:2.20.51.0.2-5.49.el6.cloudlinux.els
x86_64
0:2.4.9-1.el6.tuxcare.els1
i686|x86_64
0:2.4.9-1.el6.tuxcare.els1
i686|x86_64
0:2.4.40-16.el6.tuxcare.els1
x86_64
0:2.4.40-16.el6.tuxcare.els1
i686|x86_64
0:2.4.40-16.el6.tuxcare.els2
x86_64
0:2.4.40-16.el6.tuxcare.els2
x86_64
7:3.1.23-25.el6.cloudlinux.els
x86_64
7:3.1.23-29.el6.cloudlinux.els
x86_64
7:3.1.23-30.el6.cloudlinux.els
i686|x86_64
0:6.7.2.7-7.el6
x86_64
0:6.7.2.7-7.el6
i686|x86_64
0:0.96-11.el6_10.1.tuxcare.els1
0:0.96-11.el6_10.1.tuxcare.els1
x86_64
0:0.96-11.el6_10.1.tuxcare.els1
x86_64
0:4.0.3-20.el6.cloudlinux.els6
x86_64
3:7.4.629-5.2.el6.tuxcare.els23
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[1-9]).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els11
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els11
x86_64
1:1.8.0.342.b07-1.el6.tuxcare.els1
1:1.8.0.342.b07-1.el6.tuxcare.els1
x86_64
0:5.3.3-55.el6.tuxcare.els3
x86_64
3:7.4.629-5.2.el6.tuxcare.els24
x86_64
0:4.92.3-3.el6.tuxcare.els2
x86_64
0:3.0.6-12.el6.tuxcare.els2
i686|x86_64
0:1.2.3-29.el6.tuxcare.els2
x86_64
0:1.2.3-29.el6.tuxcare.els2
i686|x86_64
0:2.0.1-13.el6_8.tuxcare.els1
x86_64
3:7.4.629-5.2.el6.tuxcare.els25
x86_64
1:1.7.0.351-2.6.28.0.el6.tuxcare.els1
1:1.7.0.351-2.6.28.0.el6.tuxcare.els1
x86_64
3:7.4.629-5.2.el6.tuxcare.els26
x86_64
0:3.0.6-12.el6.tuxcare.els3
x86_64
0:3.0.6-12.el6.tuxcare.els4
x86_64
0:2.2.15-72.el6.tuxcare.els6
i686|x86_64
0:2.2.15-72.el6.tuxcare.els6
0:2.2.15-72.el6.tuxcare.els6
x86_64
1:2.2.15-72.el6.tuxcare.els6
x86_64
0:2.2.15-72.el6.tuxcare.els7
i686|x86_64
0:2.2.15-72.el6.tuxcare.els7
0:2.2.15-72.el6.tuxcare.els7
x86_64
1:2.2.15-72.el6.tuxcare.els7
i686|x86_64
0:2.0.1-13.el6_8.tuxcare.els2
x86_64
3:7.4.629-5.2.el6.tuxcare.els30
x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els6
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els6
x86_64
0:3.6.20-1.el6_7.2.tuxcare.els1
i686|x86_64
0:3.6.20-1.el6_7.2.tuxcare.els1
x86_64
7:3.1.23-30.el6.tuxcare.els7
x86_64
7:3.4.14-16.el6.tuxcare.els2
x86_64
3:7.4.629-5.2.el6.tuxcare.els31
i686|x86_64
0:2.0.1-13.el6_8.tuxcare.els3
x86_64
4:5.10.1-146.el6.tuxcare.els4
x86_64
1:0.38-146.el6.tuxcare.els4
x86_64
0:1.58-146.el6.tuxcare.els4
x86_64
0:3.51-146.el6.tuxcare.els4
x86_64
0:1.9402-146.el6.tuxcare.els4
x86_64
0:0.88-146.el6.tuxcare.els4
x86_64
0:2.021-146.el6.tuxcare.els4
x86_64
1:2.021-146.el6.tuxcare.els4
x86_64
1:5.47-146.el6.tuxcare.els4
x86_64
1:0.27-146.el6.tuxcare.els4
x86_64
0:1.28-146.el6.tuxcare.els4
x86_64
0:6.55-146.el6.tuxcare.els4
x86_64
1:2.2003.0-146.el6.tuxcare.els4
x86_64
0:0.26-146.el6.tuxcare.els4
x86_64
1:1.09-146.el6.tuxcare.els4
x86_64
1:0.56-146.el6.tuxcare.els4
x86_64
1:0.18-146.el6.tuxcare.els4
x86_64
1:0.02-146.el6.tuxcare.els4
x86_64
0:0.04-146.el6.tuxcare.els4
x86_64
1:0.3500-146.el6.tuxcare.els4
x86_64
0:2.18-146.el6.tuxcare.els4
x86_64
1:0.16-146.el6.tuxcare.els4
x86_64
0:0.30-146.el6.tuxcare.els4
x86_64
1:3.90-146.el6.tuxcare.els4
x86_64
1:0.34-146.el6.tuxcare.els4
x86_64
1:0.26-146.el6.tuxcare.els4
x86_64
1:1.40-146.el6.tuxcare.els4
x86_64
1:1.04-146.el6.tuxcare.els4
x86_64
1:3.13-146.el6.tuxcare.els4
x86_64
0:0.20-146.el6.tuxcare.els4
x86_64
0:3.17-146.el6.tuxcare.els4
x86_64
0:0.92-146.el6.tuxcare.els4
x86_64
4:1.9721-146.el6.tuxcare.els4
x86_64
0:1.15-146.el6.tuxcare.els4
x86_64
0:5.10.1-146.el6.tuxcare.els4
i686|x86_64
4:5.10.1-146.el6.tuxcare.els4
x86_64
1:0.221-146.el6.tuxcare.els4
x86_64
3:0.77-146.el6.tuxcare.els4
x86_64
0:3.6.20-1.el6_7.2.tuxcare.els2
i686|x86_64
0:3.6.20-1.el6_7.2.tuxcare.els2
x86_64
0:1.10.3-4.el6.tuxcare.els5
0:1.10.3-4.el6.tuxcare.els5
x86_64
0:253-2.el6.tuxcare.els2
i686|x86_64
0:2.6.6-70.el6.tuxcare.els8
x86_64
0:2.6.6-70.el6.tuxcare.els8
x86_64
3:7.4.629-5.2.el6.tuxcare.els32
i686|x86_64
0:2.7.6-21.el6_8.1.tuxcare.els3
x86_64
0:2.7.6-21.el6_8.1.tuxcare.els3
i686|x86_64
0:1.10.3-65.el6.tuxcare.els1
x86_64
0:1.10.3-65.el6.tuxcare.els1
x86_64
3:7.4.629-5.2.el6.tuxcare.els33
x86_64
3:7.4.629-5.2.el6.tuxcare.els34
x86_64
0:7.19.7-59.el6.tuxcare.els7
i686|x86_64
0:7.19.7-59.el6.tuxcare.els7
x86_64
3:7.4.629-5.2.el6.tuxcare.els35
x86_64
0:5.3p1-125.el6.tuxcare.els4
i686|x86_64
0:0.9.3-125.el6.tuxcare.els4
x86_64
3:7.4.629-5.2.el6.tuxcare.els36
x86_64
0:2.2.15-72.el6.tuxcare.els8
i686|x86_64
0:2.2.15-72.el6.tuxcare.els8
0:2.2.15-72.el6.tuxcare.els8
x86_64
1:2.2.15-72.el6.tuxcare.els8
x86_64
3:7.4.629-5.2.el6.tuxcare.els37
x86_64
0:1.8.6p3-32.el6.tuxcare.els1
i686|x86_64
0:1.8.6p3-32.el6.tuxcare.els1
x86_64
1:1.8.0.362.b09-1.el6.tuxcare.els1
1:1.8.0.362.b09-1.el6.tuxcare.els1
i686|x86_64
0:1.0.1e-63.el6.tuxcare.els8
x86_64
0:1.0.1e-63.el6.tuxcare.els8
0:1.7.1-10.el6_10.tuxcare.els1
x86_64
0:1.7.1-10.el6_10.tuxcare.els1
x86_64
2:1.23-15.el6_8.tuxcare.els1
x86_64
0:2.2.15-72.el6.tuxcare.els9
i686|x86_64
0:2.2.15-72.el6.tuxcare.els9
0:2.2.15-72.el6.tuxcare.els9
x86_64
1:2.2.15-72.el6.tuxcare.els9
i686|x86_64
0:2.6.6-70.el6.tuxcare.els9
x86_64
0:2.6.6-70.el6.tuxcare.els9
x86_64
0:5.3.3-55.el6.tuxcare.els4
x86_64
3:7.4.629-5.2.el6.tuxcare.els38
x86_64
3:7.4.629-5.2.el6.tuxcare.els39
i686|x86_64
0:3.44.0-12.el6.tuxcare.els3
x86_64
0:3.44.0-12.el6.tuxcare.els3
x86_64
0:7.19.7-59.el6.tuxcare.els8
i686|x86_64
0:7.19.7-59.el6.tuxcare.els8
x86_64
0:7.19.7-59.el6.tuxcare.els9
i686|x86_64
0:7.19.7-59.el6.tuxcare.els9
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[2-9]).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els12
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els12
i686|x86_64
0:1.0.1e-63.el6.tuxcare.els9
x86_64
0:1.0.1e-63.el6.tuxcare.els9
0:1.7.1-10.el6_10.tuxcare.els2
x86_64
0:1.7.1-10.el6_10.tuxcare.els2
x86_64
0:9.0.4-33.el6_9.1.tuxcare.els1
x86_64
3:7.4.629-5.2.el6.tuxcare.els40
x86_64
3:7.4.629-5.2.el6.tuxcare.els41
i686|x86_64
0:1.0.1e-63.el6.tuxcare.els10
x86_64
0:1.0.1e-63.el6.tuxcare.els10
x86_64
0:4.92.3-3.el6.tuxcare.els3
x86_64
1:1.8.0.372.b07-1.el6.tuxcare.els1
1:1.8.0.372.b07-1.el6.tuxcare.els1
i686|x86_64
0:2.4.40-16.el6.tuxcare.els3
x86_64
0:2.4.40-16.el6.tuxcare.els3
i686|x86_64
0:2.6.6-70.el6.tuxcare.els10
x86_64
0:2.6.6-70.el6.tuxcare.els10
x86_64
1:1.8.0.382.b05-1.el6.tuxcare.els1
1:1.8.0.382.b05-1.el6.tuxcare.els1
x86_64
0:5.3p1-125.el6.tuxcare.els5
i686|x86_64
0:0.9.3-125.el6.tuxcare.els5
x86_64
3:1.17-33.39.el6_10.tuxcare.els2
i686|x86_64
0:2.6.1p2-9.el6_6.tuxcare.els1
x86_64
0:2.6.1p2-9.el6_6.tuxcare.els1
i686|x86_64
0:3.6.23-53.el6_10.tuxcare.els1
x86_64
0:3.6.23-53.el6_10.tuxcare.els1
x86_64
0:5.3.3-55.el6.tuxcare.els6
x86_64
3:1.17-33.40.el6_10.tuxcare.els1
x86_64
1:1.15.1-21.el6_6.tuxcare.els2
x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els6
i686|x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els6
x86_64
3:7.4.629-5.2.el6.tuxcare.els42
x86_64
3:7.4.629-5.2.el6.tuxcare.els44
i686|x86_64
0:1.4.2-3.el6_10.1.tuxcare.els1
x86_64
0:1.4.2-3.el6_10.1.tuxcare.els1
i686|x86_64
0:2.6.6-70.el6.tuxcare.els11
x86_64
0:2.6.6-70.el6.tuxcare.els11
x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els7
i686|x86_64
1:2.20.51.0.2-5.48.1.el6.tuxcare.els7
i686|x86_64
0:0.4.3-3.el6.tuxcare.els1
x86_64
0:0.4.3-3.el6.tuxcare.els1
x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els7
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els7
x86_64
0:7.19.7-59.el6.tuxcare.els10
i686|x86_64
0:7.19.7-59.el6.tuxcare.els10
x86_64
0:4.92.3-3.el6.tuxcare.els4
x86_64
0:0.99.15-14.el6.tuxcare.els2
i686|x86_64
0:0.99.15-14.el6.tuxcare.els2
x86_64
0:1.10.3-4.el6.tuxcare.els6
0:1.10.3-4.el6.tuxcare.els6
i686|x86_64
0:2.6.6-70.el6.tuxcare.els12
x86_64
0:2.6.6-70.el6.tuxcare.els12
i686|x86_64
0:1.2.3-29.el6.tuxcare.els3
x86_64
0:1.2.3-29.el6.tuxcare.els3
x86_64
3:7.4.629-5.2.el6.tuxcare.els45
i686|x86_64
0:2.7.6-21.el6_8.1.tuxcare.els4
x86_64
0:2.7.6-21.el6_8.1.tuxcare.els4
x86_64
0:4.92.3-3.el6.tuxcare.els5
x86_64
7:3.1.23-30.el6.tuxcare.els8
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[3-9]).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els13
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els13
i686|x86_64
0:3.6.23-53.el6_10.tuxcare.els2
x86_64
0:3.6.23-53.el6_10.tuxcare.els2
x86_64
0:4.92.3-3.el6.tuxcare.els6
x86_64
7:3.4.14-16.el6.tuxcare.els3
x86_64
7:3.4.14-16.el6.tuxcare.els4
i686|x86_64
0:1.0.7-4.el6.tuxcare.els1
x86_64
3:1.17-33.41.el6_10.tuxcare.els1
x86_64
7:3.1.23-30.el6.tuxcare.els9
x86_64
7:3.4.14-16.el6.tuxcare.els5
x86_64
0:1.5.18-1.el6.tuxcare.els1
x86_64
7:3.4.14-16.el6.tuxcare.els6
x86_64
7:3.1.23-30.el6.tuxcare.els10
x86_64
0:5.3p1-125.el6.tuxcare.els6
i686|x86_64
0:0.9.3-125.el6.tuxcare.els6
i686|x86_64
0:2.6.6-70.el6.tuxcare.els13
x86_64
0:2.6.6-70.el6.tuxcare.els13
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[4-9]).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els14
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els14
x86_64
7:3.4.14-16.el6.tuxcare.els7
x86_64
7:3.1.23-30.el6.tuxcare.els11
x86_64
1:1.8.0.402.b06-1.el6.tuxcare.els1
1:1.8.0.402.b06-1.el6.tuxcare.els1
x86_64
0:1.8.6p3-32.el6.tuxcare.els2
i686|x86_64
0:1.8.6p3-32.el6.tuxcare.els2
i686|x86_64
0:2.7.6-21.el6_8.1.tuxcare.els5
x86_64
0:2.7.6-21.el6_8.1.tuxcare.els5
(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[5-9]).(x86_64|i686)$)
x86_64
0:2.6.32-754.35.8.el6.tuxcare.els15
i686|x86_64
0:2.6.32-754.35.8.el6.tuxcare.els15
x86_64
3:7.4.629-5.2.el6.tuxcare.els46
x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els8
i686|x86_64
33:9.8.2-0.68.rc1.el6.11.tuxcare.els8
x86_64
7:3.1.23-30.el6.tuxcare.els12