Vulnerabilities > CVE-2019-12448 - Race Condition vulnerability in Gnome Gvfs
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Leveraging Race Conditions This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
- Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Nessus
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-4053-1.NASL description It was discovered that GVfs incorrectly handled the admin backend. Files created or moved by the admin backend could end up with the wrong ownership information, contrary to expectations. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448, CVE-2019-12449) It was discovered that GVfs incorrectly handled authentication on its private D-Bus socket. A local attacker could possibly connect to this socket and issue D-Bus calls. (CVE-2019-12795). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 126598 published 2019-07-10 reporter Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126598 title Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : gvfs vulnerabilities (USN-4053-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-4053-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(126598); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795"); script_xref(name:"USN", value:"4053-1"); script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : gvfs vulnerabilities (USN-4053-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "It was discovered that GVfs incorrectly handled the admin backend. Files created or moved by the admin backend could end up with the wrong ownership information, contrary to expectations. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448, CVE-2019-12449) It was discovered that GVfs incorrectly handled authentication on its private D-Bus socket. A local attacker could possibly connect to this socket and issue D-Bus calls. (CVE-2019-12795). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/4053-1/" ); script_set_attribute( attribute:"solution", value:"Update the affected gvfs and / or gvfs-backends packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gvfs-backends"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:19.04"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/10"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! preg(pattern:"^(16\.04|18\.04|18\.10|19\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 18.04 / 18.10 / 19.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"16.04", pkgname:"gvfs", pkgver:"1.28.2-1ubuntu1~16.04.3")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"gvfs-backends", pkgver:"1.28.2-1ubuntu1~16.04.3")) flag++; if (ubuntu_check(osver:"18.04", pkgname:"gvfs", pkgver:"1.36.1-0ubuntu1.3.3")) flag++; if (ubuntu_check(osver:"18.04", pkgname:"gvfs-backends", pkgver:"1.36.1-0ubuntu1.3.3")) flag++; if (ubuntu_check(osver:"18.10", pkgname:"gvfs", pkgver:"1.38.1-0ubuntu1.3.2")) flag++; if (ubuntu_check(osver:"18.10", pkgname:"gvfs-backends", pkgver:"1.38.1-0ubuntu1.3.2")) flag++; if (ubuntu_check(osver:"19.04", pkgname:"gvfs", pkgver:"1.40.1-1ubuntu0.1")) flag++; if (ubuntu_check(osver:"19.04", pkgname:"gvfs-backends", pkgver:"1.40.1-1ubuntu0.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs / gvfs-backends"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-1697.NASL description This update for gvfs fixes the following issues : Security issues fixed : - CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). - CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). - CVE-2019-12449: Fixed an improper handling of file last seen 2020-06-01 modified 2020-06-02 plugin id 126522 published 2019-07-08 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126522 title openSUSE Security Update : gvfs (openSUSE-2019-1697) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2019-1697. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(126522); script_version("1.4"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795"); script_name(english:"openSUSE Security Update : gvfs (openSUSE-2019-1697)"); script_summary(english:"Check for the openSUSE-2019-1697 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update for gvfs fixes the following issues : Security issues fixed : - CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). - CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). - CVE-2019-12449: Fixed an improper handling of file's user and group ownership in daemon/gvfsbackendadmin.c (bsc#1136992). - CVE-2019-12448: Fixed race conditions in daemon/gvfsbackendadmin.c due to implementation of query_info_on_read/write at admin backend (bsc#1136981). Other issue addressed : - Drop polkit rules files that are only relevant for wheel group (bsc#1125433). This update was imported from the SUSE:SLE-15:Update update project." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1125433" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136981" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136986" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136992" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1137930" ); script_set_attribute(attribute:"solution", value:"Update the affected gvfs packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-32bit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-32bit-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-afc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-afc-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-samba"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-samba-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backends"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backends-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-lang"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.1"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/08"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE15\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.1", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-afc-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-samba-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backends-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backends-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-debugsource-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-devel-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-fuse-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-fuse-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", reference:"gvfs-lang-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-lp151.6.3.1") ) flag++; if ( rpm_check(release:"SUSE15.1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs / gvfs-backend-afc / gvfs-backend-afc-debuginfo / etc"); }
NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1968.NASL description According to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn last seen 2020-05-08 modified 2019-09-23 plugin id 129125 published 2019-09-23 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129125 title EulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-1968) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(129125); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/07"); script_cve_id( "CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449" ); script_name(english:"EulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-1968)"); script_summary(english:"Checks the rpm output for the updated packages."); script_set_attribute(attribute:"synopsis", value: "The remote EulerOS host is missing multiple security updates."); script_set_attribute(attribute:"description", value: "According to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.(CVE-2019-12448) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.(CVE-2019-12449) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues."); # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1968 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?67877fd3"); script_set_attribute(attribute:"solution", value: "Update the affected gvfs packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"patch_publication_date", value:"2019/09/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/23"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-archive"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-goa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-gphoto2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-mtp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-smb"); script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Huawei Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp"); script_exclude_keys("Host/EulerOS/uvp_version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/EulerOS/release"); if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS"); if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0"); sp = get_kb_item("Host/EulerOS/sp"); if (isnull(sp) || sp !~ "^(5)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5"); uvp = get_kb_item("Host/EulerOS/uvp_version"); if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5", "EulerOS UVP " + uvp); if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu); flag = 0; pkgs = ["gvfs-1.30.4-5.h2.eulerosv2r7", "gvfs-afc-1.30.4-5.h2.eulerosv2r7", "gvfs-afp-1.30.4-5.h2.eulerosv2r7", "gvfs-archive-1.30.4-5.h2.eulerosv2r7", "gvfs-client-1.30.4-5.h2.eulerosv2r7", "gvfs-devel-1.30.4-5.h2.eulerosv2r7", "gvfs-fuse-1.30.4-5.h2.eulerosv2r7", "gvfs-goa-1.30.4-5.h2.eulerosv2r7", "gvfs-gphoto2-1.30.4-5.h2.eulerosv2r7", "gvfs-mtp-1.30.4-5.h2.eulerosv2r7", "gvfs-smb-1.30.4-5.h2.eulerosv2r7"]; foreach (pkg in pkgs) if (rpm_check(release:"EulerOS-2.0", sp:"5", reference:pkg)) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2020-1766.NASL description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1766 advisory. - LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) - gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) - gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) - gvfs: mishandling of file last seen 2020-05-03 modified 2020-04-29 plugin id 136113 published 2020-04-29 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136113 title RHEL 8 : GNOME (RHSA-2020:1766) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2020:1766. The text # itself is copyright (C) Red Hat, Inc. # include('compat.inc'); if (description) { script_id(136113); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/01"); script_cve_id( "CVE-2018-20337", "CVE-2019-3825", "CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449" ); script_bugtraq_id(107124, 109289); script_xref(name:"RHSA", value:"2020:1766"); script_name(english:"RHEL 8 : GNOME (RHSA-2020:1766)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute(attribute:"synopsis", value: "The remote Red Hat host is missing one or more security updates."); script_set_attribute(attribute:"description", value: "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1766 advisory. - LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) - gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) - gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) - gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) - gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number."); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/121.html"); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/282.html"); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/364.html"); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/282.html"); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/287.html"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:1766"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2018-20337"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12447"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12448"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12449"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-3825"); script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1661555"); script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1672825"); script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728562"); script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728564"); script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728567"); script_set_attribute(attribute:"solution", value: "Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3825"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_cwe_id(121, 282, 287, 364); script_set_attribute(attribute:"vuln_publication_date", value:"2018/12/21"); script_set_attribute(attribute:"patch_publication_date", value:"2020/04/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/29"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8"); script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8::appstream"); script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8::crb"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8::baseos"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:appstream-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:baobab"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:baobab-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-browser-plugin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-nautilus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gdm"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gdm-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-boxes"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-boxes-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center-filesystem"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-remote-desktop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-remote-desktop-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-wayland-session"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-xsession"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-shell"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-shell-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software-editor"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal-nautilus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-tweaks"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gsettings-desktop-schemas"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gsettings-desktop-schemas-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk-update-icon-cache"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-immodule-xim"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-afc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-afp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-archive"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-goa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-mtp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-smb"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-extensions"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vinagre"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vinagre-debugsource"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Red Hat Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include('audit.inc'); include('global_settings.inc'); include('misc_func.inc'); include('rpm.inc'); if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item('Host/RedHat/release'); if (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat'); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat'); os_ver = os_ver[1]; if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver); if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item('Host/cpu'); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu); pkgs = [ {'reference':'accountsservice-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'accountsservice-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'appstream-data-8-20191129.el8', 'release':'8'}, {'reference':'baobab-3.28.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'baobab-3.28.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'baobab-3.28.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'clutter-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'clutter-1.26.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'clutter-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'clutter-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'evince-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'evince-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'evince-browser-plugin-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'evince-browser-plugin-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'evince-nautilus-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'evince-nautilus-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gdm-3.28.3-29.el8', 'cpu':'aarch64', 'release':'8', 'epoch':'1'}, {'reference':'gdm-3.28.3-29.el8', 'cpu':'i686', 'release':'8', 'epoch':'1'}, {'reference':'gdm-3.28.3-29.el8', 'cpu':'x86_64', 'release':'8', 'epoch':'1'}, {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'aarch64', 'release':'8', 'epoch':'1'}, {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'i686', 'release':'8', 'epoch':'1'}, {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'x86_64', 'release':'8', 'epoch':'1'}, {'reference':'gjs-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gjs-1.56.2-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gjs-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gjs-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-boxes-3.28.5-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-boxes-debugsource-3.28.5-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-control-center-3.28.2-19.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-control-center-3.28.2-19.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-control-center-debugsource-3.28.2-19.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-control-center-debugsource-3.28.2-19.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-control-center-filesystem-3.28.2-19.el8', 'release':'8'}, {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-remote-desktop-0.1.6-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-remote-desktop-0.1.6-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-remote-desktop-debugsource-0.1.6-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-remote-desktop-debugsource-0.1.6-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-session-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-session-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-session-debugsource-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-session-debugsource-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-session-wayland-session-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-session-wayland-session-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-session-xsession-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-session-xsession-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-settings-daemon-3.32.0-9.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-settings-daemon-3.32.0-9.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-settings-daemon-debugsource-3.32.0-9.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-settings-daemon-debugsource-3.32.0-9.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-shell-3.32.2-14.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-shell-3.32.2-14.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-shell-debugsource-3.32.2-14.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-shell-debugsource-3.32.2-14.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-software-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-software-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-software-debugsource-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-software-debugsource-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-software-editor-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-software-editor-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-terminal-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-terminal-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-terminal-debugsource-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-terminal-debugsource-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-terminal-nautilus-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gnome-terminal-nautilus-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gnome-tweaks-3.28.1-7.el8', 'release':'8'}, {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gtk3-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gtk3-3.22.30-5.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gtk3-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gtk3-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-1.36.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gvfs-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-afc-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-afc-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-afp-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-afp-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-archive-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-archive-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'i686', 'release':'8'}, {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-goa-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-goa-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libxslt-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libxslt-1.1.32-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libxslt-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libxslt-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mutter-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mutter-3.32.2-34.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mutter-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'i686', 'release':'8'}, {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'nautilus-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'nautilus-3.28.1-12.el8', 'cpu':'i686', 'release':'8'}, {'reference':'nautilus-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'i686', 'release':'8'}, {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'i686', 'release':'8'}, {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'i686', 'release':'8'}, {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'vala-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'vala-0.40.19-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'vala-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'vala-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'i686', 'release':'8'}, {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'vinagre-3.22.0-21.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'vinagre-3.22.0-21.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'vinagre-3.22.0-21.el8', 'cpu':'x86_64', 'release':'8'}, {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'aarch64', 'release':'8'}, {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'s390x', 'release':'8'}, {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'x86_64', 'release':'8'} ]; flag = 0; foreach package_array ( pkgs ) { reference = NULL; release = NULL; sp = NULL; cpu = NULL; el_string = NULL; rpm_spec_vers_cmp = NULL; epoch = NULL; if (!empty_or_null(package_array['reference'])) reference = package_array['reference']; if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release']; if (!empty_or_null(package_array['sp'])) sp = package_array['sp']; if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu']; if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string']; if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp']; if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch']; if (reference && release) { if (rpm_spec_vers_cmp) { if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:TRUE)) flag++; } else { if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch)) flag++; } } } if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'LibRaw / LibRaw-debugsource / LibRaw-devel / etc'); }
NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2079.NASL description According to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn last seen 2020-05-03 modified 2019-09-30 plugin id 129438 published 2019-09-30 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129438 title EulerOS 2.0 SP8 : gvfs (EulerOS-SA-2019-2079) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(129438); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/01"); script_cve_id( "CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449" ); script_name(english:"EulerOS 2.0 SP8 : gvfs (EulerOS-SA-2019-2079)"); script_summary(english:"Checks the rpm output for the updated packages."); script_set_attribute(attribute:"synopsis", value: "The remote EulerOS host is missing multiple security updates."); script_set_attribute(attribute:"description", value: "According to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.(CVE-2019-12448) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.(CVE-2019-12449) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues."); # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2079 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?23bf0612"); script_set_attribute(attribute:"solution", value: "Update the affected gvfs packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"patch_publication_date", value:"2019/09/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/30"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-archive"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-goa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-gphoto2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-mtp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-smb"); script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Huawei Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp"); script_exclude_keys("Host/EulerOS/uvp_version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/EulerOS/release"); if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS"); if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0"); sp = get_kb_item("Host/EulerOS/sp"); if (isnull(sp) || sp !~ "^(8)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8"); uvp = get_kb_item("Host/EulerOS/uvp_version"); if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8", "EulerOS UVP " + uvp); if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu); if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu); flag = 0; pkgs = ["gvfs-1.38.1-1.h4.eulerosv2r8", "gvfs-afc-1.38.1-1.h4.eulerosv2r8", "gvfs-afp-1.38.1-1.h4.eulerosv2r8", "gvfs-archive-1.38.1-1.h4.eulerosv2r8", "gvfs-client-1.38.1-1.h4.eulerosv2r8", "gvfs-devel-1.38.1-1.h4.eulerosv2r8", "gvfs-fuse-1.38.1-1.h4.eulerosv2r8", "gvfs-goa-1.38.1-1.h4.eulerosv2r8", "gvfs-gphoto2-1.38.1-1.h4.eulerosv2r8", "gvfs-mtp-1.38.1-1.h4.eulerosv2r8", "gvfs-smb-1.38.1-1.h4.eulerosv2r8"]; foreach (pkg in pkgs) if (rpm_check(release:"EulerOS-2.0", sp:"8", reference:pkg)) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2019-E6B02AF8B8.NASL description Update to 1.38.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 127533 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127533 title Fedora 29 : gvfs (2019-e6b02af8b8) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory FEDORA-2019-e6b02af8b8. # include("compat.inc"); if (description) { script_id(127533); script_version("1.4"); script_cvs_date("Date: 2020/01/06"); script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795"); script_xref(name:"FEDORA", value:"2019-e6b02af8b8"); script_name(english:"Fedora 29 : gvfs (2019-e6b02af8b8)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Update to 1.38.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-e6b02af8b8" ); script_set_attribute(attribute:"solution", value:"Update the affected gvfs package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gvfs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:29"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/08/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! preg(pattern:"^29([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 29", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC29", reference:"gvfs-1.38.3-1.fc29")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2019-6ED5523CC0.NASL description Update to 1.40.2 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 126838 published 2019-07-22 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126838 title Fedora 30 : gvfs (2019-6ed5523cc0) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory FEDORA-2019-6ed5523cc0. # include("compat.inc"); if (description) { script_id(126838); script_version("1.4"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795"); script_xref(name:"FEDORA", value:"2019-6ed5523cc0"); script_name(english:"Fedora 30 : gvfs (2019-6ed5523cc0)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Update to 1.40.2 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-6ed5523cc0" ); script_set_attribute(attribute:"solution", value:"Update the affected gvfs package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gvfs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/22"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC30", reference:"gvfs-1.40.2-1.fc30")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-1717-1.NASL description This update for gvfs fixes the following issues : Security issues fixed : CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). CVE-2019-12449: Fixed an improper handling of file last seen 2020-06-01 modified 2020-06-02 plugin id 126444 published 2019-07-02 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126444 title SUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:1717-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:1717-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(126444); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795"); script_name(english:"SUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:1717-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for gvfs fixes the following issues : Security issues fixed : CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). CVE-2019-12449: Fixed an improper handling of file's user and group ownership in daemon/gvfsbackendadmin.c (bsc#1136992). CVE-2019-12448: Fixed race conditions in daemon/gvfsbackendadmin.c due to implementation of query_info_on_read/write at admin backend (bsc#1136981). Other issue addressed: Drop polkit rules files that are only relevant for wheel group (bsc#1125433). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1125433" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136981" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136986" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136992" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137930" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12447/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12448/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12449/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12795/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20191717-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?7b401e56" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1717=1 SUSE Linux Enterprise Module for Desktop Applications 15-SP1:zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1717=1 SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-1717=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-32bit-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-afc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-afc-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-samba"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-samba-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backends"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backends-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/01"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/02"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0/1", os_ver + " SP" + sp); if (os_ver == "SLED15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0/1", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-1699.NASL description This update for gvfs fixes the following issues : Security issues fixed : - CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). - CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). - CVE-2019-12449: Fixed an improper handling of file last seen 2020-06-01 modified 2020-06-02 plugin id 126523 published 2019-07-08 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126523 title openSUSE Security Update : gvfs (openSUSE-2019-1699)
Redhat
rpms |
|
References
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html
- https://usn.ubuntu.com/4053-1/
- http://www.openwall.com/lists/oss-security/2019/07/09/3
- https://gitlab.gnome.org/GNOME/gvfs/commit/764e9af7522e3096c0f44613c330377d31c9bbb5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M2DQVOL5H5BVLXYCEB763DCIYJQ7ZUQ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FP6BFQUPQRVRRFIYHFWWB6RHJNEB4LGQ/