Vulnerabilities > CVE-2019-12448 - Race Condition vulnerability in Gnome Gvfs

047910
CVSS 8.1 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
high complexity
gnome
CWE-362
nessus

Summary

An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4053-1.NASL
    descriptionIt was discovered that GVfs incorrectly handled the admin backend. Files created or moved by the admin backend could end up with the wrong ownership information, contrary to expectations. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448, CVE-2019-12449) It was discovered that GVfs incorrectly handled authentication on its private D-Bus socket. A local attacker could possibly connect to this socket and issue D-Bus calls. (CVE-2019-12795). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126598
    published2019-07-10
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126598
    titleUbuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : gvfs vulnerabilities (USN-4053-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-4053-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126598);
      script_version("1.5");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795");
      script_xref(name:"USN", value:"4053-1");
    
      script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : gvfs vulnerabilities (USN-4053-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that GVfs incorrectly handled the admin backend.
    Files created or moved by the admin backend could end up with the
    wrong ownership information, contrary to expectations. This issue only
    affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04.
    (CVE-2019-12447, CVE-2019-12448, CVE-2019-12449)
    
    It was discovered that GVfs incorrectly handled authentication on its
    private D-Bus socket. A local attacker could possibly connect to this
    socket and issue D-Bus calls. (CVE-2019-12795).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/4053-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected gvfs and / or gvfs-backends packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gvfs-backends");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:19.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/10");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(16\.04|18\.04|18\.10|19\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 18.04 / 18.10 / 19.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"16.04", pkgname:"gvfs", pkgver:"1.28.2-1ubuntu1~16.04.3")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"gvfs-backends", pkgver:"1.28.2-1ubuntu1~16.04.3")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"gvfs", pkgver:"1.36.1-0ubuntu1.3.3")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"gvfs-backends", pkgver:"1.36.1-0ubuntu1.3.3")) flag++;
    if (ubuntu_check(osver:"18.10", pkgname:"gvfs", pkgver:"1.38.1-0ubuntu1.3.2")) flag++;
    if (ubuntu_check(osver:"18.10", pkgname:"gvfs-backends", pkgver:"1.38.1-0ubuntu1.3.2")) flag++;
    if (ubuntu_check(osver:"19.04", pkgname:"gvfs", pkgver:"1.40.1-1ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"19.04", pkgname:"gvfs-backends", pkgver:"1.40.1-1ubuntu0.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs / gvfs-backends");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1697.NASL
    descriptionThis update for gvfs fixes the following issues : Security issues fixed : - CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). - CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). - CVE-2019-12449: Fixed an improper handling of file
    last seen2020-06-01
    modified2020-06-02
    plugin id126522
    published2019-07-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126522
    titleopenSUSE Security Update : gvfs (openSUSE-2019-1697)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-1697.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126522);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795");
    
      script_name(english:"openSUSE Security Update : gvfs (openSUSE-2019-1697)");
      script_summary(english:"Check for the openSUSE-2019-1697 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for gvfs fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2019-12795: Fixed a vulnerability which could have
        allowed attacks via local D-Bus method calls
        (bsc#1137930).
    
      - CVE-2019-12447: Fixed an improper handling of file
        ownership in daemon/gvfsbackendadmin.c due to no use of
        setfsuid (bsc#1136986). 
    
      - CVE-2019-12449: Fixed an improper handling of file's
        user and group ownership in daemon/gvfsbackendadmin.c
        (bsc#1136992).
    
      - CVE-2019-12448: Fixed race conditions in
        daemon/gvfsbackendadmin.c due to implementation of
        query_info_on_read/write at admin backend (bsc#1136981).
    
    Other issue addressed :
    
      - Drop polkit rules files that are only relevant for wheel
        group (bsc#1125433).
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1125433"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136981"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136986"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136992"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1137930"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gvfs packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-afc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-afc-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-samba");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backend-samba-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backends");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-backends-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvfs-lang");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.1");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/08");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-afc-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-samba-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backends-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-backends-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-debugsource-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-devel-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-fuse-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-fuse-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", reference:"gvfs-lang-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-lp151.6.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-lp151.6.3.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs / gvfs-backend-afc / gvfs-backend-afc-debuginfo / etc");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1968.NASL
    descriptionAccording to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn
    last seen2020-05-08
    modified2019-09-23
    plugin id129125
    published2019-09-23
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129125
    titleEulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-1968)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(129125);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/07");
    
      script_cve_id(
        "CVE-2019-12447",
        "CVE-2019-12448",
        "CVE-2019-12449"
      );
    
      script_name(english:"EulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-1968)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the gvfs packages installed, the EulerOS
    installation on the remote host is affected by the following
    vulnerabilities :
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c mishandles file
        ownership because setfsuid is not used.(CVE-2019-12447)
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c has race conditions
        because the admin backend doesn't implement
        query_info_on_read/write.(CVE-2019-12448)
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c mishandles a file's
        user and group ownership during move (and copy with
        G_FILE_COPY_ALL_METADATA) operations from admin:// to
        file:// URIs, because root privileges are
        unavailable.(CVE-2019-12449)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1968
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?67877fd3");
      script_set_attribute(attribute:"solution", value:
    "Update the affected gvfs packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/09/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/23");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-archive");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-goa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-gphoto2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-mtp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-smb");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(5)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["gvfs-1.30.4-5.h2.eulerosv2r7",
            "gvfs-afc-1.30.4-5.h2.eulerosv2r7",
            "gvfs-afp-1.30.4-5.h2.eulerosv2r7",
            "gvfs-archive-1.30.4-5.h2.eulerosv2r7",
            "gvfs-client-1.30.4-5.h2.eulerosv2r7",
            "gvfs-devel-1.30.4-5.h2.eulerosv2r7",
            "gvfs-fuse-1.30.4-5.h2.eulerosv2r7",
            "gvfs-goa-1.30.4-5.h2.eulerosv2r7",
            "gvfs-gphoto2-1.30.4-5.h2.eulerosv2r7",
            "gvfs-mtp-1.30.4-5.h2.eulerosv2r7",
            "gvfs-smb-1.30.4-5.h2.eulerosv2r7"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"5", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1766.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1766 advisory. - LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) - gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) - gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) - gvfs: mishandling of file
    last seen2020-05-03
    modified2020-04-29
    plugin id136113
    published2020-04-29
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136113
    titleRHEL 8 : GNOME (RHSA-2020:1766)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2020:1766. The text
    # itself is copyright (C) Red Hat, Inc.
    #
    
    
    include('compat.inc');
    
    if (description)
    {
      script_id(136113);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/01");
    
      script_cve_id(
        "CVE-2018-20337",
        "CVE-2019-3825",
        "CVE-2019-12447",
        "CVE-2019-12448",
        "CVE-2019-12449"
      );
      script_bugtraq_id(107124, 109289);
      script_xref(name:"RHSA", value:"2020:1766");
    
      script_name(english:"RHEL 8 : GNOME (RHSA-2020:1766)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Red Hat host is missing one or more security updates.");
      script_set_attribute(attribute:"description", value:
    "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as
    referenced in the RHSA-2020:1766 advisory.
    
      - LibRaw: stack-based buffer overflow in the
        parse_makernote function of dcraw_common.cpp
        (CVE-2018-20337)
    
      - gvfs: mishandling of file ownership in
        daemon/gvfsbackendadmin.c (CVE-2019-12447)
    
      - gvfs: race condition in daemon/gvfsbackendadmin.c due to
        admin backend not implementing query_info_on_read/write
        (CVE-2019-12448)
    
      - gvfs: mishandling of file's user and group ownership in
        daemon/gvfsbackendadmin.c due to unavailability of root
        privileges (CVE-2019-12449)
    
      - gdm: lock screen bypass when timed login is enabled
        (CVE-2019-3825)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/121.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/282.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/364.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/282.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/287.html");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:1766");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2018-20337");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12447");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12448");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-12449");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-3825");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1661555");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1672825");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728562");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728564");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1728567");
      script_set_attribute(attribute:"solution", value:
    "Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3825");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_cwe_id(121, 282, 287, 364);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/12/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/29");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8::appstream");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:enterprise_linux:8::crb");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8::baseos");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:accountsservice-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:appstream-data");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:baobab");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:baobab-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:clutter-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-browser-plugin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evince-nautilus");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gdm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gdm-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gjs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-boxes");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-boxes-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-control-center-filesystem");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-menus-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-online-accounts-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-remote-desktop");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-remote-desktop-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-wayland-session");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-session-xsession");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-shell");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-shell-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-software-editor");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-terminal-nautilus");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-tweaks");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gsettings-desktop-schemas");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gsettings-desktop-schemas-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk-update-icon-cache");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gtk3-immodule-xim");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-afc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-afp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-archive");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-goa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-mtp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gvfs-smb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libvncserver-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libxslt-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs52-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mozjs60-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mutter-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nautilus-extensions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vala-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vinagre");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:vinagre-debugsource");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Red Hat Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include('audit.inc');
    include('global_settings.inc');
    include('misc_func.inc');
    include('rpm.inc');
    
    if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item('Host/RedHat/release');
    if (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
    os_ver = os_ver[1];
    if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);
    
    if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item('Host/cpu');
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
    
    pkgs = [
        {'reference':'accountsservice-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'accountsservice-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'accountsservice-debugsource-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'accountsservice-devel-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'accountsservice-libs-0.6.50-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'appstream-data-8-20191129.el8', 'release':'8'},
        {'reference':'baobab-3.28.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'baobab-3.28.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'baobab-3.28.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'baobab-debugsource-3.28.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'clutter-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'clutter-1.26.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'clutter-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'clutter-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'clutter-debugsource-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'clutter-devel-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'clutter-doc-1.26.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'evince-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'evince-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'evince-browser-plugin-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'evince-browser-plugin-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'evince-debugsource-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'evince-libs-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'evince-nautilus-3.28.4-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'evince-nautilus-3.28.4-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gdm-3.28.3-29.el8', 'cpu':'aarch64', 'release':'8', 'epoch':'1'},
        {'reference':'gdm-3.28.3-29.el8', 'cpu':'i686', 'release':'8', 'epoch':'1'},
        {'reference':'gdm-3.28.3-29.el8', 'cpu':'x86_64', 'release':'8', 'epoch':'1'},
        {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'aarch64', 'release':'8', 'epoch':'1'},
        {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'i686', 'release':'8', 'epoch':'1'},
        {'reference':'gdm-debugsource-3.28.3-29.el8', 'cpu':'x86_64', 'release':'8', 'epoch':'1'},
        {'reference':'gjs-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gjs-1.56.2-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gjs-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gjs-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gjs-debugsource-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gjs-devel-1.56.2-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-boxes-3.28.5-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-boxes-debugsource-3.28.5-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-control-center-3.28.2-19.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-control-center-3.28.2-19.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-control-center-debugsource-3.28.2-19.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-control-center-debugsource-3.28.2-19.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-control-center-filesystem-3.28.2-19.el8', 'release':'8'},
        {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-menus-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-menus-debugsource-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-menus-devel-3.13.3-11.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-online-accounts-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-online-accounts-debugsource-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gnome-online-accounts-devel-3.28.2-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-remote-desktop-0.1.6-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-remote-desktop-0.1.6-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-remote-desktop-debugsource-0.1.6-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-remote-desktop-debugsource-0.1.6-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-session-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-session-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-session-debugsource-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-session-debugsource-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-session-wayland-session-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-session-wayland-session-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-session-xsession-3.28.1-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-session-xsession-3.28.1-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-settings-daemon-3.32.0-9.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-settings-daemon-3.32.0-9.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-settings-daemon-debugsource-3.32.0-9.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-settings-daemon-debugsource-3.32.0-9.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-shell-3.32.2-14.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-shell-3.32.2-14.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-shell-debugsource-3.32.2-14.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-shell-debugsource-3.32.2-14.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-software-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-software-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-software-debugsource-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-software-debugsource-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-software-editor-3.30.6-3.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-software-editor-3.30.6-3.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-terminal-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-terminal-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-terminal-debugsource-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-terminal-debugsource-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-terminal-nautilus-3.28.3-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gnome-terminal-nautilus-3.28.3-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gnome-tweaks-3.28.1-7.el8', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-3.32.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gsettings-desktop-schemas-devel-3.32.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gtk-update-icon-cache-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gtk3-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gtk3-3.22.30-5.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gtk3-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gtk3-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gtk3-debugsource-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gtk3-devel-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gtk3-immodule-xim-3.22.30-5.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-1.36.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gvfs-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-afc-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-afc-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-afp-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-afp-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-archive-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-archive-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-client-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-debugsource-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-devel-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-fuse-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-goa-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-goa-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-gphoto2-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-mtp-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'gvfs-smb-1.36.2-8.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'LibRaw-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'LibRaw-debugsource-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'LibRaw-devel-0.19.5-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libvncserver-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libvncserver-debugsource-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libvncserver-devel-0.9.11-14.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libxslt-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libxslt-1.1.32-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libxslt-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libxslt-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libxslt-debugsource-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'libxslt-devel-1.1.32-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs52-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs52-debugsource-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs52-devel-52.9.0-2.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs60-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs60-debugsource-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'mozjs60-devel-60.9.0-4.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mutter-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mutter-3.32.2-34.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mutter-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mutter-debugsource-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'mutter-devel-3.32.2-34.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'nautilus-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'nautilus-3.28.1-12.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'nautilus-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'nautilus-debugsource-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'nautilus-devel-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'nautilus-extensions-3.28.1-12.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'vala-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'vala-0.40.19-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'vala-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'vala-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'vala-debugsource-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'i686', 'release':'8'},
        {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'vala-devel-0.40.19-1.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'vinagre-3.22.0-21.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'vinagre-3.22.0-21.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'vinagre-3.22.0-21.el8', 'cpu':'x86_64', 'release':'8'},
        {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'aarch64', 'release':'8'},
        {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'s390x', 'release':'8'},
        {'reference':'vinagre-debugsource-3.22.0-21.el8', 'cpu':'x86_64', 'release':'8'}
    ];
    
    flag = 0;
    foreach package_array ( pkgs ) {
      reference = NULL;
      release = NULL;
      sp = NULL;
      cpu = NULL;
      el_string = NULL;
      rpm_spec_vers_cmp = NULL;
      epoch = NULL;
      if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
      if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];
      if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
      if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
      if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
      if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
      if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
      if (reference && release) {
        if (rpm_spec_vers_cmp) {
          if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:TRUE)) flag++;
        }
        else
        {
          if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch)) flag++;
        }
      }
    }
    
    if (flag)
    {
      security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'LibRaw / LibRaw-debugsource / LibRaw-devel / etc');
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2079.NASL
    descriptionAccording to the versions of the gvfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.(CVE-2019-12447) - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn
    last seen2020-05-03
    modified2019-09-30
    plugin id129438
    published2019-09-30
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129438
    titleEulerOS 2.0 SP8 : gvfs (EulerOS-SA-2019-2079)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(129438);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/01");
    
      script_cve_id(
        "CVE-2019-12447",
        "CVE-2019-12448",
        "CVE-2019-12449"
      );
    
      script_name(english:"EulerOS 2.0 SP8 : gvfs (EulerOS-SA-2019-2079)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the gvfs packages installed, the EulerOS
    installation on the remote host is affected by the following
    vulnerabilities :
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c mishandles file
        ownership because setfsuid is not used.(CVE-2019-12447)
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c has race conditions
        because the admin backend doesn't implement
        query_info_on_read/write.(CVE-2019-12448)
    
      - An issue was discovered in GNOME gvfs 1.29.4 through
        1.41.2. daemon/gvfsbackendadmin.c mishandles a file's
        user and group ownership during move (and copy with
        G_FILE_COPY_ALL_METADATA) operations from admin:// to
        file:// URIs, because root privileges are
        unavailable.(CVE-2019-12449)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2079
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?23bf0612");
      script_set_attribute(attribute:"solution", value:
    "Update the affected gvfs packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/09/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/30");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-afp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-archive");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-goa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-gphoto2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-mtp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:gvfs-smb");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(8)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
    
    flag = 0;
    
    pkgs = ["gvfs-1.38.1-1.h4.eulerosv2r8",
            "gvfs-afc-1.38.1-1.h4.eulerosv2r8",
            "gvfs-afp-1.38.1-1.h4.eulerosv2r8",
            "gvfs-archive-1.38.1-1.h4.eulerosv2r8",
            "gvfs-client-1.38.1-1.h4.eulerosv2r8",
            "gvfs-devel-1.38.1-1.h4.eulerosv2r8",
            "gvfs-fuse-1.38.1-1.h4.eulerosv2r8",
            "gvfs-goa-1.38.1-1.h4.eulerosv2r8",
            "gvfs-gphoto2-1.38.1-1.h4.eulerosv2r8",
            "gvfs-mtp-1.38.1-1.h4.eulerosv2r8",
            "gvfs-smb-1.38.1-1.h4.eulerosv2r8"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"8", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-E6B02AF8B8.NASL
    descriptionUpdate to 1.38.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id127533
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127533
    titleFedora 29 : gvfs (2019-e6b02af8b8)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory FEDORA-2019-e6b02af8b8.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127533);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/06");
    
      script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795");
      script_xref(name:"FEDORA", value:"2019-e6b02af8b8");
    
      script_name(english:"Fedora 29 : gvfs (2019-e6b02af8b8)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Update to 1.38.3
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora update system website.
    Tenable has attempted to automatically clean and format it as much as
    possible without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-e6b02af8b8"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gvfs package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gvfs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:29");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/08/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! preg(pattern:"^29([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 29", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"FC29", reference:"gvfs-1.38.3-1.fc29")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-6ED5523CC0.NASL
    descriptionUpdate to 1.40.2 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126838
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126838
    titleFedora 30 : gvfs (2019-6ed5523cc0)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory FEDORA-2019-6ed5523cc0.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126838);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795");
      script_xref(name:"FEDORA", value:"2019-6ed5523cc0");
    
      script_name(english:"Fedora 30 : gvfs (2019-6ed5523cc0)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Update to 1.40.2
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora update system website.
    Tenable has attempted to automatically clean and format it as much as
    possible without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-6ed5523cc0"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gvfs package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gvfs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"FC30", reference:"gvfs-1.40.2-1.fc30")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1717-1.NASL
    descriptionThis update for gvfs fixes the following issues : Security issues fixed : CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). CVE-2019-12449: Fixed an improper handling of file
    last seen2020-06-01
    modified2020-06-02
    plugin id126444
    published2019-07-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126444
    titleSUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:1717-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2019:1717-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126444);
      script_version("1.5");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-12447", "CVE-2019-12448", "CVE-2019-12449", "CVE-2019-12795");
    
      script_name(english:"SUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:1717-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for gvfs fixes the following issues :
    
    Security issues fixed :
    
    CVE-2019-12795: Fixed a vulnerability which could have allowed attacks
    via local D-Bus method calls (bsc#1137930).
    
    CVE-2019-12447: Fixed an improper handling of file ownership in
    daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986).
    
    CVE-2019-12449: Fixed an improper handling of file's user and group
    ownership in daemon/gvfsbackendadmin.c (bsc#1136992).
    
    CVE-2019-12448: Fixed race conditions in daemon/gvfsbackendadmin.c due
    to implementation of query_info_on_read/write at admin backend
    (bsc#1136981).
    
    Other issue addressed: Drop polkit rules files that are only relevant
    for wheel group (bsc#1125433).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1125433"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1136981"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1136986"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1136992"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1137930"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-12447/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-12448/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-12449/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-12795/"
      );
      # https://www.suse.com/support/update/announcement/2019/suse-su-20191717-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7b401e56"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Module for Open Buildservice Development Tools
    15-SP1:zypper in -t patch
    SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1717=1
    
    SUSE Linux Enterprise Module for Desktop Applications 15-SP1:zypper in
    -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1717=1
    
    SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t
    patch SUSE-SLE-Module-Desktop-Applications-15-2019-1717=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-afc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-afc-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-samba");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backend-samba-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backends");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-backends-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvfs-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/02");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0/1", os_ver + " SP" + sp);
    if (os_ver == "SLED15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0/1", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"1", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-32bit-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", cpu:"x86_64", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"1", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-afc-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-afc-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-samba-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backend-samba-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backends-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-backends-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-debuginfo-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-debugsource-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-devel-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-fuse-1.34.2.1-4.13.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"gvfs-fuse-debuginfo-1.34.2.1-4.13.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvfs");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1699.NASL
    descriptionThis update for gvfs fixes the following issues : Security issues fixed : - CVE-2019-12795: Fixed a vulnerability which could have allowed attacks via local D-Bus method calls (bsc#1137930). - CVE-2019-12447: Fixed an improper handling of file ownership in daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986). - CVE-2019-12449: Fixed an improper handling of file
    last seen2020-06-01
    modified2020-06-02
    plugin id126523
    published2019-07-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126523
    titleopenSUSE Security Update : gvfs (openSUSE-2019-1699)

Redhat

rpms
  • LibRaw-0:0.19.5-1.el8
  • LibRaw-debuginfo-0:0.19.5-1.el8
  • LibRaw-debugsource-0:0.19.5-1.el8
  • LibRaw-devel-0:0.19.5-1.el8
  • LibRaw-samples-debuginfo-0:0.19.5-1.el8
  • accountsservice-0:0.6.50-8.el8
  • accountsservice-debuginfo-0:0.6.50-8.el8
  • accountsservice-debugsource-0:0.6.50-8.el8
  • accountsservice-devel-0:0.6.50-8.el8
  • accountsservice-libs-0:0.6.50-8.el8
  • accountsservice-libs-debuginfo-0:0.6.50-8.el8
  • appstream-data-0:8-20191129.el8
  • baobab-0:3.28.0-4.el8
  • baobab-debuginfo-0:3.28.0-4.el8
  • baobab-debugsource-0:3.28.0-4.el8
  • clutter-0:1.26.2-8.el8
  • clutter-debuginfo-0:1.26.2-8.el8
  • clutter-debugsource-0:1.26.2-8.el8
  • clutter-devel-0:1.26.2-8.el8
  • clutter-doc-0:1.26.2-8.el8
  • clutter-tests-debuginfo-0:1.26.2-8.el8
  • evince-0:3.28.4-4.el8
  • evince-browser-plugin-0:3.28.4-4.el8
  • evince-browser-plugin-debuginfo-0:3.28.4-4.el8
  • evince-debuginfo-0:3.28.4-4.el8
  • evince-debugsource-0:3.28.4-4.el8
  • evince-libs-0:3.28.4-4.el8
  • evince-libs-debuginfo-0:3.28.4-4.el8
  • evince-nautilus-0:3.28.4-4.el8
  • evince-nautilus-debuginfo-0:3.28.4-4.el8
  • gdm-1:3.28.3-29.el8
  • gdm-debuginfo-1:3.28.3-29.el8
  • gdm-debugsource-1:3.28.3-29.el8
  • gjs-0:1.56.2-4.el8
  • gjs-debuginfo-0:1.56.2-4.el8
  • gjs-debugsource-0:1.56.2-4.el8
  • gjs-devel-0:1.56.2-4.el8
  • gjs-tests-debuginfo-0:1.56.2-4.el8
  • gnome-boxes-0:3.28.5-8.el8
  • gnome-boxes-debuginfo-0:3.28.5-8.el8
  • gnome-boxes-debugsource-0:3.28.5-8.el8
  • gnome-control-center-0:3.28.2-19.el8
  • gnome-control-center-debuginfo-0:3.28.2-19.el8
  • gnome-control-center-debugsource-0:3.28.2-19.el8
  • gnome-control-center-filesystem-0:3.28.2-19.el8
  • gnome-menus-0:3.13.3-11.el8
  • gnome-menus-debuginfo-0:3.13.3-11.el8
  • gnome-menus-debugsource-0:3.13.3-11.el8
  • gnome-menus-devel-0:3.13.3-11.el8
  • gnome-online-accounts-0:3.28.2-1.el8
  • gnome-online-accounts-debuginfo-0:3.28.2-1.el8
  • gnome-online-accounts-debugsource-0:3.28.2-1.el8
  • gnome-online-accounts-devel-0:3.28.2-1.el8
  • gnome-remote-desktop-0:0.1.6-8.el8
  • gnome-remote-desktop-debuginfo-0:0.1.6-8.el8
  • gnome-remote-desktop-debugsource-0:0.1.6-8.el8
  • gnome-session-0:3.28.1-8.el8
  • gnome-session-debuginfo-0:3.28.1-8.el8
  • gnome-session-debugsource-0:3.28.1-8.el8
  • gnome-session-wayland-session-0:3.28.1-8.el8
  • gnome-session-xsession-0:3.28.1-8.el8
  • gnome-settings-daemon-0:3.32.0-9.el8
  • gnome-settings-daemon-debuginfo-0:3.32.0-9.el8
  • gnome-settings-daemon-debugsource-0:3.32.0-9.el8
  • gnome-shell-0:3.32.2-14.el8
  • gnome-shell-debuginfo-0:3.32.2-14.el8
  • gnome-shell-debugsource-0:3.32.2-14.el8
  • gnome-software-0:3.30.6-3.el8
  • gnome-software-debuginfo-0:3.30.6-3.el8
  • gnome-software-debugsource-0:3.30.6-3.el8
  • gnome-software-editor-0:3.30.6-3.el8
  • gnome-software-editor-debuginfo-0:3.30.6-3.el8
  • gnome-terminal-0:3.28.3-1.el8
  • gnome-terminal-debuginfo-0:3.28.3-1.el8
  • gnome-terminal-debugsource-0:3.28.3-1.el8
  • gnome-terminal-nautilus-0:3.28.3-1.el8
  • gnome-terminal-nautilus-debuginfo-0:3.28.3-1.el8
  • gnome-tweaks-0:3.28.1-7.el8
  • gsettings-desktop-schemas-0:3.32.0-4.el8
  • gsettings-desktop-schemas-devel-0:3.32.0-4.el8
  • gtk-update-icon-cache-0:3.22.30-5.el8
  • gtk-update-icon-cache-debuginfo-0:3.22.30-5.el8
  • gtk3-0:3.22.30-5.el8
  • gtk3-debuginfo-0:3.22.30-5.el8
  • gtk3-debugsource-0:3.22.30-5.el8
  • gtk3-devel-0:3.22.30-5.el8
  • gtk3-devel-debuginfo-0:3.22.30-5.el8
  • gtk3-immodule-xim-0:3.22.30-5.el8
  • gtk3-immodule-xim-debuginfo-0:3.22.30-5.el8
  • gtk3-immodules-debuginfo-0:3.22.30-5.el8
  • gtk3-tests-debuginfo-0:3.22.30-5.el8
  • gvfs-0:1.36.2-8.el8
  • gvfs-afc-0:1.36.2-8.el8
  • gvfs-afc-debuginfo-0:1.36.2-8.el8
  • gvfs-afp-0:1.36.2-8.el8
  • gvfs-afp-debuginfo-0:1.36.2-8.el8
  • gvfs-archive-0:1.36.2-8.el8
  • gvfs-archive-debuginfo-0:1.36.2-8.el8
  • gvfs-client-0:1.36.2-8.el8
  • gvfs-client-debuginfo-0:1.36.2-8.el8
  • gvfs-debuginfo-0:1.36.2-8.el8
  • gvfs-debugsource-0:1.36.2-8.el8
  • gvfs-devel-0:1.36.2-8.el8
  • gvfs-fuse-0:1.36.2-8.el8
  • gvfs-fuse-debuginfo-0:1.36.2-8.el8
  • gvfs-goa-0:1.36.2-8.el8
  • gvfs-goa-debuginfo-0:1.36.2-8.el8
  • gvfs-gphoto2-0:1.36.2-8.el8
  • gvfs-gphoto2-debuginfo-0:1.36.2-8.el8
  • gvfs-mtp-0:1.36.2-8.el8
  • gvfs-mtp-debuginfo-0:1.36.2-8.el8
  • gvfs-smb-0:1.36.2-8.el8
  • gvfs-smb-debuginfo-0:1.36.2-8.el8
  • libvncserver-0:0.9.11-14.el8
  • libvncserver-debuginfo-0:0.9.11-14.el8
  • libvncserver-debugsource-0:0.9.11-14.el8
  • libvncserver-devel-0:0.9.11-14.el8
  • libxslt-0:1.1.32-4.el8
  • libxslt-debuginfo-0:1.1.32-4.el8
  • libxslt-debugsource-0:1.1.32-4.el8
  • libxslt-devel-0:1.1.32-4.el8
  • mozjs52-0:52.9.0-2.el8
  • mozjs52-debuginfo-0:52.9.0-2.el8
  • mozjs52-debugsource-0:52.9.0-2.el8
  • mozjs52-devel-0:52.9.0-2.el8
  • mozjs52-devel-debuginfo-0:52.9.0-2.el8
  • mozjs60-0:60.9.0-4.el8
  • mozjs60-debuginfo-0:60.9.0-4.el8
  • mozjs60-debugsource-0:60.9.0-4.el8
  • mozjs60-devel-0:60.9.0-4.el8
  • mutter-0:3.32.2-34.el8
  • mutter-debuginfo-0:3.32.2-34.el8
  • mutter-debugsource-0:3.32.2-34.el8
  • mutter-devel-0:3.32.2-34.el8
  • mutter-tests-debuginfo-0:3.32.2-34.el8
  • nautilus-0:3.28.1-12.el8
  • nautilus-debuginfo-0:3.28.1-12.el8
  • nautilus-debugsource-0:3.28.1-12.el8
  • nautilus-devel-0:3.28.1-12.el8
  • nautilus-extensions-0:3.28.1-12.el8
  • nautilus-extensions-debuginfo-0:3.28.1-12.el8
  • vala-0:0.40.19-1.el8
  • vala-debuginfo-0:0.40.19-1.el8
  • vala-debugsource-0:0.40.19-1.el8
  • vala-devel-0:0.40.19-1.el8
  • valadoc-debuginfo-0:0.40.19-1.el8
  • vinagre-0:3.22.0-21.el8
  • vinagre-debuginfo-0:3.22.0-21.el8
  • vinagre-debugsource-0:3.22.0-21.el8