Vulnerabilities |
1959 via 1959 paths |
|---|---|
Dependencies |
229 |
Source |
Docker |
Target OS |
centos:7 |
critical severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.67.0-4.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. Note: This vulnerability does NOT impact Mozilla Firefox. However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.
Remediation
Upgrade Centos:7 nss to version 0:3.67.0-4.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-43527
- https://access.redhat.com/errata/RHSA-2021:4904
- https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
- https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
- https://security.gentoo.org/glsa/202212-05
- https://security.netapp.com/advisory/ntap-20211229-0002/
- https://www.mozilla.org/security/advisories/mfsa2021-51/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.starwindsoftware.com/security/sw-20220802-0001/
critical severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.67.0-4.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. Note: This vulnerability does NOT impact Mozilla Firefox. However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.67.0-4.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-43527
- https://access.redhat.com/errata/RHSA-2021:4904
- https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
- https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
- https://security.gentoo.org/glsa/202212-05
- https://security.netapp.com/advisory/ntap-20211229-0002/
- https://www.mozilla.org/security/advisories/mfsa2021-51/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.starwindsoftware.com/security/sw-20220802-0001/
critical severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.67.0-4.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. Note: This vulnerability does NOT impact Mozilla Firefox. However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.67.0-4.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-43527
- https://access.redhat.com/errata/RHSA-2021:4904
- https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
- https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
- https://security.gentoo.org/glsa/202212-05
- https://security.netapp.com/advisory/ntap-20211229-0002/
- https://www.mozilla.org/security/advisories/mfsa2021-51/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.starwindsoftware.com/security/sw-20220802-0001/
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-25235
- https://access.redhat.com/errata/RHSA-2022:1069
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- http://www.openwall.com/lists/oss-security/2022/02/19/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/562
- https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220303-0008/
- https://www.debian.org/security/2022/dsa-5085
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-25236
- https://access.redhat.com/errata/RHSA-2022:1069
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
- http://www.openwall.com/lists/oss-security/2022/02/19/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/561
- https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220303-0008/
- https://www.debian.org/security/2022/dsa-5085
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22822
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-23852
- https://access.redhat.com/errata/RHSA-2022:1069
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/550
- https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220217-0001/
- https://www.debian.org/security/2022/dsa-5073
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22824
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22823
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-25315
- https://access.redhat.com/errata/RHSA-2022:1069
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- http://www.openwall.com/lists/oss-security/2022/02/19/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/559
- https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220303-0008/
- https://www.debian.org/security/2022/dsa-5085
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
- Fixed in: 0:2.56.1-9.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
Remediation
Upgrade Centos:7 glib2 to version 0:2.56.1-9.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210319-0004/
- https://access.redhat.com/security/cve/CVE-2021-27219
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
- https://gitlab.gnome.org/GNOME/glib/-/issues/2319
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:2147
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
- https://security.gentoo.org/glsa/202107-13
high severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
- Fixed in: 0:219-78.el7_9.7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
Remediation
Upgrade Centos:7 systemd to version 0:219-78.el7_9.7 or higher.
References
high severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
- Fixed in: 0:219-78.el7_9.7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
Remediation
Upgrade Centos:7 systemd-libs to version 0:219-78.el7_9.7 or higher.
References
high severity
- Vulnerable module: cyrus-sasl-lib
- Introduced through: cyrus-sasl-lib@2.1.26-23.el7
- Fixed in: 0:2.1.26-24.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cyrus-sasl-lib@2.1.26-23.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cyrus-sasl-lib package and not the cyrus-sasl-lib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
Remediation
Upgrade Centos:7 cyrus-sasl-lib to version 0:2.1.26-24.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-24407
- https://access.redhat.com/errata/RHSA-2022:0666
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
- http://www.openwall.com/lists/oss-security/2022/02/23/4
- https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
- https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
- https://security.netapp.com/advisory/ntap-20221007-0003/
- https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
- https://www.debian.org/security/2022/dsa-5087
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-45960
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/issues/531
- https://github.com/libexpat/libexpat/pull/534
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220121-0004/
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22825
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22827
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-22826
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/539
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-2961
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
- http://www.openwall.com/lists/oss-security/2024/04/17/9
- http://www.openwall.com/lists/oss-security/2024/04/18/4
- http://www.openwall.com/lists/oss-security/2024/04/24/2
- http://www.openwall.com/lists/oss-security/2024/05/27/1
- http://www.openwall.com/lists/oss-security/2024/05/27/2
- http://www.openwall.com/lists/oss-security/2024/05/27/3
- http://www.openwall.com/lists/oss-security/2024/05/27/4
- http://www.openwall.com/lists/oss-security/2024/05/27/5
- http://www.openwall.com/lists/oss-security/2024/05/27/6
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
- https://security.netapp.com/advisory/ntap-20240531-0002/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
- https://github.com/ambionics/cnext-exploits
- https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2024/CVE-2024-2961.yaml
high severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-2961
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
- https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
- http://www.openwall.com/lists/oss-security/2024/04/17/9
- http://www.openwall.com/lists/oss-security/2024/04/18/4
- http://www.openwall.com/lists/oss-security/2024/04/24/2
- http://www.openwall.com/lists/oss-security/2024/05/27/1
- http://www.openwall.com/lists/oss-security/2024/05/27/2
- http://www.openwall.com/lists/oss-security/2024/05/27/3
- http://www.openwall.com/lists/oss-security/2024/05/27/4
- http://www.openwall.com/lists/oss-security/2024/05/27/5
- http://www.openwall.com/lists/oss-security/2024/05/27/6
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
- https://security.netapp.com/advisory/ntap-20240531-0002/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
- https://github.com/ambionics/cnext-exploits
- https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2024/CVE-2024-2961.yaml
high severity
- Vulnerable module: gzip
- Introduced through: gzip@1.5-10.el7
- Fixed in: 0:1.5-11.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gzip@1.5-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gzip package and not the gzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Remediation
Upgrade Centos:7 gzip to version 0:1.5-11.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-1271
- https://access.redhat.com/errata/RHSA-2022:2191
- https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://bugzilla.redhat.com/show_bug.cgi?id=2073310
- https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
- https://security-tracker.debian.org/tracker/CVE-2022-1271
- https://security.gentoo.org/glsa/202209-01
- https://security.netapp.com/advisory/ntap-20220930-0006/
- https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
- https://www.openwall.com/lists/oss-security/2022/04/07/8
high severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
- Fixed in: 0:1.15.1-55.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Remediation
Upgrade Centos:7 krb5-libs to version 0:1.15.1-55.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-42898
- https://access.redhat.com/errata/RHSA-2022:8640
- https://bugzilla.samba.org/show_bug.cgi?id=15203
- https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
- https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
- https://security.gentoo.org/glsa/202309-06
- https://security.gentoo.org/glsa/202310-06
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230223-0001/
- https://web.mit.edu/kerberos/advisories/
- https://web.mit.edu/kerberos/krb5-1.19/
- https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
- https://www.samba.org/samba/security/CVE-2022-42898.html
high severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.79.0-5.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
Remediation
Upgrade Centos:7 nss to version 0:3.79.0-5.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-0767
- https://access.redhat.com/errata/RHSA-2023:1332
- https://security.netapp.com/advisory/ntap-20230324-0008/
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
high severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.79.0-5.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.79.0-5.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-0767
- https://access.redhat.com/errata/RHSA-2023:1332
- https://security.netapp.com/advisory/ntap-20230324-0008/
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
high severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.79.0-5.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.79.0-5.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-0767
- https://access.redhat.com/errata/RHSA-2023:1332
- https://security.netapp.com/advisory/ntap-20230324-0008/
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
high severity
new
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the path-reservations system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., ß and ss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a PathReservations system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using NFD Unicode normalization (in which ß and ss are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which ß causes an inode collision with ss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates path-reservations.js to use a normalization form that matches the target filesystem's behavior (e.g., NFKD), followed by first toLocaleLowerCase('en') and then toLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically using node-tar to extract arbitrary tarball data should filter out all SymbolicLink entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
Remediation
There is no fixed version for Centos:7 tar.
References
high severity
- Vulnerable module: xz
- Introduced through: xz@5.2.2-1.el7
- Fixed in: 0:5.2.2-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › xz@5.2.2-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream xz package and not the xz package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Remediation
Upgrade Centos:7 xz to version 0:5.2.2-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-1271
- https://access.redhat.com/errata/RHSA-2022:5052
- https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://bugzilla.redhat.com/show_bug.cgi?id=2073310
- https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
- https://security-tracker.debian.org/tracker/CVE-2022-1271
- https://security.gentoo.org/glsa/202209-01
- https://security.netapp.com/advisory/ntap-20220930-0006/
- https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
- https://www.openwall.com/lists/oss-security/2022/04/07/8
high severity
- Vulnerable module: xz-libs
- Introduced through: xz-libs@5.2.2-1.el7
- Fixed in: 0:5.2.2-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › xz-libs@5.2.2-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream xz-libs package and not the xz-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Remediation
Upgrade Centos:7 xz-libs to version 0:5.2.2-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-1271
- https://access.redhat.com/errata/RHSA-2022:5052
- https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://bugzilla.redhat.com/show_bug.cgi?id=2073310
- https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
- https://security-tracker.debian.org/tracker/CVE-2022-1271
- https://security.gentoo.org/glsa/202209-01
- https://security.netapp.com/advisory/ntap-20220930-0006/
- https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
- https://www.openwall.com/lists/oss-security/2022/04/07/8
high severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
- Fixed in: 0:2.8-14.el7_9.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade Centos:7 freetype to version 0:2.8-14.el7_9.1 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-15999
- https://www.debian.org/security/2021/dsa-4824
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
- http://seclists.org/fulldisclosure/2020/Nov/33
- https://security.gentoo.org/glsa/202011-12
- https://security.gentoo.org/glsa/202012-04
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1139963
- https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
- https://access.redhat.com/errata/RHSA-2020:4907
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
- https://security.netapp.com/advisory/ntap-20240812-0001/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
- https://security.gentoo.org/glsa/202401-19
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-15999
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
high severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-94.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Remediation
Upgrade Centos:7 python to version 0:2.7.5-94.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-40217
- https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://www.python.org/dev/security/
high severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-94.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-94.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-40217
- https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://www.python.org/dev/security/
high severity
new
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
Remediation
There is no fixed version for Centos:7 tar.
References
high severity
- Vulnerable module: zlib
- Introduced through: zlib@1.2.7-18.el7
- Fixed in: 0:1.2.7-20.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › zlib@1.2.7-18.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Remediation
Upgrade Centos:7 zlib to version 0:1.2.7-20.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2018-25032
- https://access.redhat.com/errata/RHSA-2022:2213
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
- http://seclists.org/fulldisclosure/2022/May/33
- http://seclists.org/fulldisclosure/2022/May/35
- http://seclists.org/fulldisclosure/2022/May/38
- http://www.openwall.com/lists/oss-security/2022/03/25/2
- http://www.openwall.com/lists/oss-security/2022/03/26/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/issues/605
- https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
- https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
- https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
- https://security.gentoo.org/glsa/202210-42
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://www.debian.org/security/2022/dsa-5111
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.4 or higher.
References
- https://kb.isc.org/v1/docs/cve-2020-8625
- https://security.netapp.com/advisory/ntap-20210319-0001/
- https://access.redhat.com/security/cve/CVE-2020-8625
- https://www.debian.org/security/2021/dsa-4857
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/
- https://www.zerodayinitiative.com/advisories/ZDI-21-195/
- https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html
- http://www.openwall.com/lists/oss-security/2021/02/19/1
- http://www.openwall.com/lists/oss-security/2021/02/20/2
- https://access.redhat.com/errata/RHSA-2021:0671
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-15.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-15.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-40674
- https://access.redhat.com/errata/RHSA-2022:6834
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2IGJNHFV53PYST7VQV3T4NHVYAMXA36/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/
- https://github.com/libexpat/libexpat/pull/629
- https://github.com/libexpat/libexpat/pull/640
- https://lists.debian.org/debian-lts-announce/2022/09/msg00029.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2IGJNHFV53PYST7VQV3T4NHVYAMXA36/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/
- https://security.gentoo.org/glsa/202209-24
- https://security.gentoo.org/glsa/202211-06
- https://security.netapp.com/advisory/ntap-20221028-0008/
- https://www.debian.org/security/2022/dsa-5236
high severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-14.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-14.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-46143
- https://access.redhat.com/errata/RHSA-2022:1069
- http://www.openwall.com/lists/oss-security/2022/01/17/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/issues/532
- https://github.com/libexpat/libexpat/pull/538
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220121-0006/
- https://www.debian.org/security/2022/dsa-5073
- https://www.tenable.com/security/tns-2022-05
high severity
new
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://access.redhat.com/security/cve/CVE-2025-68973
- https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306
- https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9
- https://github.com/gpg/gnupg/compare/gnupg-2.2.50...gnupg-2.2.51
- https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i
- https://news.ycombinator.com/item?id=46403200
- https://www.openwall.com/lists/oss-security/2025/12/28/5
- http://www.openwall.com/lists/oss-security/2025/12/29/11
- https://lists.debian.org/debian-lts-announce/2026/01/msg00008.html
- https://gpg.fail/memcpy
high severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33599
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0011/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
high severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33599
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0011/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.14
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Every named instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the max-cache-size statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.
It has been discovered that the effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.14 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-2828
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://kb.isc.org/docs/cve-2023-2828
- https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://www.debian.org/security/2023/dsa-5439
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.15
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.15 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-3341
- http://www.openwall.com/lists/oss-security/2023/09/20/2
- https://kb.isc.org/docs/cve-2023-3341
- https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/
- https://security.netapp.com/advisory/ntap-20231013-0003/
- https://www.debian.org/security/2023/dsa-5504
high severity
new
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Malformed BRID/HHIT records can cause named to terminate unexpectedly.
This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
Remediation
There is no fixed version for Centos:7 bind-license.
References
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.10
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.10 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-38178
- https://access.redhat.com/errata/RHSA-2022:6765
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- http://www.openwall.com/lists/oss-security/2022/09/21/3
- https://kb.isc.org/docs/cve-2022-38178
- https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- https://security.gentoo.org/glsa/202210-25
- https://security.netapp.com/advisory/ntap-20221228-0009/
- https://www.debian.org/security/2022/dsa-5235
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.10
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.10 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-38177
- https://access.redhat.com/errata/RHSA-2022:6765
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- http://www.openwall.com/lists/oss-security/2022/09/21/3
- https://kb.isc.org/docs/cve-2022-38177
- https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- https://security.gentoo.org/glsa/202210-25
- https://security.netapp.com/advisory/ntap-20221228-0010/
- https://www.debian.org/security/2022/dsa-5235
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.5 or higher.
References
- https://kb.isc.org/v1/docs/cve-2021-25215
- https://security.netapp.com/advisory/ntap-20210521-0006/
- https://access.redhat.com/security/cve/CVE-2021-25215
- https://www.debian.org/security/2021/dsa-4909
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
- http://www.openwall.com/lists/oss-security/2021/04/29/1
- http://www.openwall.com/lists/oss-security/2021/04/29/2
- http://www.openwall.com/lists/oss-security/2021/04/29/3
- http://www.openwall.com/lists/oss-security/2021/04/29/4
- https://access.redhat.com/errata/RHSA-2021:1469
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.16
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The DNS message parsing code in named includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected named instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.16 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-4408
- http://www.openwall.com/lists/oss-security/2024/02/13/1
- https://kb.isc.org/docs/cve-2023-4408
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
- https://security.netapp.com/advisory/ntap-20240426-0001/
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.16
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.16 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-50868
- http://www.openwall.com/lists/oss-security/2024/02/16/2
- http://www.openwall.com/lists/oss-security/2024/02/16/3
- https://bugzilla.suse.com/show_bug.cgi?id=1219826
- https://datatracker.ietf.org/doc/html/rfc5155
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://kb.isc.org/docs/cve-2023-50868
- https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
- https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://security.netapp.com/advisory/ntap-20240307-0008/
- https://www.isc.org/blogs/2024-bind-security-release/
high severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.16
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.16 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-50387
- https://datatracker.ietf.org/doc/html/rfc4035
- https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html
- http://www.openwall.com/lists/oss-security/2024/02/16/2
- http://www.openwall.com/lists/oss-security/2024/02/16/3
- https://bugzilla.suse.com/show_bug.cgi?id=1219823
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://kb.isc.org/docs/cve-2023-50387
- https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
- https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
- https://news.ycombinator.com/item?id=39367411
- https://news.ycombinator.com/item?id=39372384
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://security.netapp.com/advisory/ntap-20240307-0007/
- https://www.athene-center.de/aktuelles/key-trap
- https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
- https://www.isc.org/blogs/2024-bind-security-release/
- https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
- https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
- https://github.com/knqyf263/CVE-2023-50387
high severity
new
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21476
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2388
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-34169
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
- http://www.openwall.com/lists/oss-security/2022/07/19/5
- http://www.openwall.com/lists/oss-security/2022/07/19/6
- http://www.openwall.com/lists/oss-security/2022/07/20/2
- http://www.openwall.com/lists/oss-security/2022/07/20/3
- http://www.openwall.com/lists/oss-security/2022/10/18/2
- http://www.openwall.com/lists/oss-security/2022/11/04/8
- http://www.openwall.com/lists/oss-security/2022/11/07/2
- https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
- https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
- https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.debian.org/security/2022/dsa-5256
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/flowerwind/AutoGenerateXalanPayload
high severity
new
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-devel.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21476
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2388
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-34169
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
- http://www.openwall.com/lists/oss-security/2022/07/19/5
- http://www.openwall.com/lists/oss-security/2022/07/19/6
- http://www.openwall.com/lists/oss-security/2022/07/20/2
- http://www.openwall.com/lists/oss-security/2022/07/20/3
- http://www.openwall.com/lists/oss-security/2022/10/18/2
- http://www.openwall.com/lists/oss-security/2022/11/04/8
- http://www.openwall.com/lists/oss-security/2022/11/07/2
- https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
- https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
- https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.debian.org/security/2022/dsa-5256
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/flowerwind/AutoGenerateXalanPayload
high severity
new
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-headless.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21476
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2388
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-34169
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
- http://www.openwall.com/lists/oss-security/2022/07/19/5
- http://www.openwall.com/lists/oss-security/2022/07/19/6
- http://www.openwall.com/lists/oss-security/2022/07/20/2
- http://www.openwall.com/lists/oss-security/2022/07/20/3
- http://www.openwall.com/lists/oss-security/2022/10/18/2
- http://www.openwall.com/lists/oss-security/2022/11/04/8
- http://www.openwall.com/lists/oss-security/2022/11/07/2
- https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
- https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
- https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.debian.org/security/2022/dsa-5256
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/flowerwind/AutoGenerateXalanPayload
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-25.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-25.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-0778
- https://access.redhat.com/errata/RHSA-2022:1066
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- http://seclists.org/fulldisclosure/2022/May/33
- http://seclists.org/fulldisclosure/2022/May/35
- http://seclists.org/fulldisclosure/2022/May/38
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- https://security.gentoo.org/glsa/202210-02
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://www.debian.org/security/2022/dsa-5103
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-09
- https://github.com/jkakavas/CVE-2022-0778-POC
high severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-93.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-93.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-24329
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
- https://github.com/python/cpython/issues/102153
- https://github.com/python/cpython/pull/99421
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
- https://pointernull.com/security/python-url-parse-problem.html
- https://security.netapp.com/advisory/ntap-20230324-0004/
- https://www.kb.cert.org/vuls/id/127587
high severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-93.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-93.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-24329
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
- https://github.com/python/cpython/issues/102153
- https://github.com/python/cpython/pull/99421
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
- https://pointernull.com/security/python-url-parse-problem.html
- https://security.netapp.com/advisory/ntap-20230324-0004/
- https://www.kb.cert.org/vuls/id/127587
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21930
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21930
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21930
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-26.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.
When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-26.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-0286
- https://access.redhat.com/errata/RHSA-2023:1335
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35567
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35567
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35567
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
- Fixed in: 1:1.6.3-52.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.
Remediation
Upgrade Centos:7 cups-libs to version 1:1.6.3-52.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21541
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21967
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21954
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35550
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21541
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21967
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21954
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35550
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21541
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21967
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21954
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35550
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-21.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-21.el7_9 or higher.
References
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
- https://security.netapp.com/advisory/ntap-20201218-0005/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://www.openssl.org/news/secadv/20201208.txt
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-10
- https://access.redhat.com/security/cve/CVE-2020-1971
- https://www.debian.org/security/2020/dsa-4807
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
- https://security.gentoo.org/glsa/202012-13
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
- http://www.openwall.com/lists/oss-security/2021/09/14/2
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2020:5566
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920
- https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: Null pointer crashes after notfound response
If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33600
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0013/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
high severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: Null pointer crashes after notfound response
If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33600
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0013/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35556
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35559
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35561
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35586
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35564
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21939
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
- https://github.com/Y4Sec-Team/CVE-2023-21939
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21496
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35565
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35578
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21426
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21540
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21434
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35561
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35556
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35586
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35559
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35564
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21939
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
- https://github.com/Y4Sec-Team/CVE-2023-21939
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21496
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35565
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35578
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21426
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21540
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21434
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35556
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35559
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35561
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35586
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35564
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21939
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
- https://github.com/Y4Sec-Team/CVE-2023-21939
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21496
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35565
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35578
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21426
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.342.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.342.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21540
- https://access.redhat.com/errata/RHSA-2022:5698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
- https://security.gentoo.org/glsa/202401-25
- https://security.netapp.com/advisory/ntap-20220729-0009/
- https://www.debian.org/security/2022/dsa-5188
- https://www.debian.org/security/2022/dsa-5192
- https://www.oracle.com/security-alerts/cpujul2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21434
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.402.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.402.b06-1.el7_9 or higher.
References
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2369
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://bugzilla.redhat.com/show_bug.cgi?id=1982879
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2369
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://bugzilla.redhat.com/show_bug.cgi?id=1982879
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2369
- https://www.debian.org/security/2021/dsa-4946
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://bugzilla.redhat.com/show_bug.cgi?id=1982879
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: netgroup cache may terminate daemon on memory allocation failure
The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33601
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0014/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
high severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: netgroup cache assumes NSS callback uses in-buffer strings
The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33602
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0012/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
high severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: netgroup cache may terminate daemon on memory allocation failure
The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33601
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0014/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
high severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-326.el7_9.3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nscd: netgroup cache assumes NSS callback uses in-buffer strings
The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-326.el7_9.3 or higher.
References
- https://access.redhat.com/security/cve/CVE-2024-33602
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0012/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21968
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21938
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21937
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35603
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21443
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21968
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21938
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21937
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35603
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21443
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21968
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21937
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.372.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.372.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-21938
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230427-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5430
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpuapr2023.html
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35603
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-5000
- https://www.debian.org/security/2021/dsa-5012
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.332.b09-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.332.b09-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21443
- https://access.redhat.com/errata/RHSA-2022:1487
- https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
- https://security.netapp.com/advisory/ntap-20220429-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5128
- https://www.debian.org/security/2022/dsa-5131
- https://www.oracle.com/security-alerts/cpuapr2022.html
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35588
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
high severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2341
- https://www.debian.org/security/2021/dsa-4946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35588
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
high severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2341
- https://www.debian.org/security/2021/dsa-4946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://security.gentoo.org/glsa/202209-05
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.312.b07-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.312.b07-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-35588
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20240621-0006/
high severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.302.b08-0.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.302.b08-0.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210723-0002/
- https://access.redhat.com/security/cve/CVE-2021-2341
- https://www.debian.org/security/2021/dsa-4946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:2845
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
- https://security.gentoo.org/glsa/202209-05
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://access.redhat.com/security/cve/CVE-2021-35942
- https://sourceware.org/glibc/wiki/Security%20Exceptions
- https://access.redhat.com/errata/RHSA-2021:4358
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://access.redhat.com/security/cve/CVE-2021-35942
- https://sourceware.org/glibc/wiki/Security%20Exceptions
- https://access.redhat.com/errata/RHSA-2021:4358
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
medium severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
- Fixed in: 0:4.0.3-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Remediation
Upgrade Centos:7 libtiff to version 0:4.0.3-35.el7 or higher.
References
- https://seclists.org/bugtraq/2020/Jan/32
- https://access.redhat.com/security/cve/CVE-2019-17546
- https://www.debian.org/security/2020/dsa-4608
- https://www.debian.org/security/2020/dsa-4670
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5ZW7E3IEW7LT2BPJP7D3RN6OUOE3MX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3S4WNIMZ7XSLY2LD5FPRPZMGNUBVKOG/
- https://security.gentoo.org/glsa/202003-25
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00020.html
- https://access.redhat.com/errata/RHSA-2020:3902
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5ZW7E3IEW7LT2BPJP7D3RN6OUOE3MX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3S4WNIMZ7XSLY2LD5FPRPZMGNUBVKOG/
- https://security.netapp.com/advisory/ntap-20241220-0007/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3970
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213843
- https://vuldb.com/?id.213549
medium severity
- Vulnerable module: python-lxml
- Introduced through: python-lxml@3.2.1-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-lxml@3.2.1-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-lxml package and not the python-lxml package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available.
Remediation
There is no fixed version for Centos:7 python-lxml.
References
- https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
- https://access.redhat.com/security/cve/CVE-2021-43818
- https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
- https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
- https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
- https://access.redhat.com/errata/RHSA-2022:1763
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:1932
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/
- https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/
- https://security.gentoo.org/glsa/202208-06
- https://security.netapp.com/advisory/ntap-20220107-0005/
- https://www.debian.org/security/2022/dsa-5043
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://seclists.org/bugtraq/2019/Aug/19
- https://access.redhat.com/security/cve/CVE-2019-5827
- https://www.debian.org/security/2019/dsa-4500
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
- https://security.gentoo.org/glsa/202003-16
- https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
- https://crbug.com/952406
- https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
- https://access.redhat.com/errata/RHSA-2019:1243
- https://access.redhat.com/errata/RHSA-2021:4396
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
- https://usn.ubuntu.com/4205-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
medium severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Centos:7 coreutils.
References
- https://access.redhat.com/security/cve/CVE-2016-2781
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/02/28/2
- http://www.openwall.com/lists/oss-security/2016/02/28/3
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
medium severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Centos:7 libblkid.
References
medium severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Centos:7 libmount.
References
medium severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Centos:7 libuuid.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://access.redhat.com/security/cve/CVE-2021-3517
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954232
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212602
- https://support.apple.com/kb/HT212604
- https://support.apple.com/kb/HT212605
- https://access.redhat.com/security/cve/CVE-2021-3518
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- http://seclists.org/fulldisclosure/2021/Jul/54
- http://seclists.org/fulldisclosure/2021/Jul/55
- http://seclists.org/fulldisclosure/2021/Jul/58
- http://seclists.org/fulldisclosure/2021/Jul/59
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954242
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://access.redhat.com/security/cve/CVE-2021-3517
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954232
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212602
- https://support.apple.com/kb/HT212604
- https://support.apple.com/kb/HT212605
- https://access.redhat.com/security/cve/CVE-2021-3518
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- http://seclists.org/fulldisclosure/2021/Jul/54
- http://seclists.org/fulldisclosure/2021/Jul/55
- http://seclists.org/fulldisclosure/2021/Jul/58
- http://seclists.org/fulldisclosure/2021/Jul/59
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954242
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: lz4
- Introduced through: lz4@1.7.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › lz4@1.7.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream lz4 package and not the lz4 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
Remediation
There is no fixed version for Centos:7 lz4.
References
- https://access.redhat.com/security/cve/CVE-2021-3520
- https://bugzilla.redhat.com/show_bug.cgi?id=1954559
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:2575
- https://access.redhat.com/errata/RHBA-2021:2854
- https://access.redhat.com/errata/RHSA-2022:1345
- https://access.redhat.com/errata/RHSA-2022:5606
- https://access.redhat.com/errata/RHSA-2022:6407
- https://security.netapp.com/advisory/ntap-20211104-0005/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Centos:7 util-linux.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
- Fixed in: 0:2.27-44.base.el7_9.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard and the Unicode Bidirectional Algorithm (all versions). Due to text display behavior when text includes left-to-right and right-to-left characters, the visual order of tokens may be different from their logical order. Additionally, control characters needed to fully support the requirements of bidirectional text can further obfuscate the logical order of tokens. Unless mitigated, an adversary could craft source code such that the ordering of tokens perceived by human reviewers does not match what will be processed by a compiler/interpreter/etc. The Unicode Consortium has documented this class of vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and in Unicode Standard Annex #31, Unicode Identifier and Pattern Syntax. Also, the BIDI specification allows applications to tailor the implementation in ways that can mitigate misleading visual reordering in program text; see HL4 in Unicode Standard Annex #9, Unicode Bidirectional Algorithm.
Remediation
Upgrade Centos:7 binutils to version 0:2.27-44.base.el7_9.1 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-42574
- https://trojansource.codes
- http://www.unicode.org/versions/Unicode14.0.0/
- http://www.openwall.com/lists/oss-security/2021/11/01/1
- https://access.redhat.com/errata/RHSA-2021:4033
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- http://www.openwall.com/lists/oss-security/2021/11/01/4
- http://www.openwall.com/lists/oss-security/2021/11/01/5
- http://www.openwall.com/lists/oss-security/2021/11/01/6
- http://www.openwall.com/lists/oss-security/2021/11/02/10
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- https://security.gentoo.org/glsa/202210-09
- https://www.kb.cert.org/vuls/id/999008
- https://www.scyon.nl/post/trojans-in-your-source-code
- https://www.starwindsoftware.com/security/sw-20220804-0002/
- https://www.unicode.org/reports/tr31/
- https://www.unicode.org/reports/tr36/
- https://www.unicode.org/reports/tr39/
- https://www.unicode.org/reports/tr9/tr9-44.html#HL4
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard and the Unicode Bidirectional Algorithm (all versions). Due to text display behavior when text includes left-to-right and right-to-left characters, the visual order of tokens may be different from their logical order. Additionally, control characters needed to fully support the requirements of bidirectional text can further obfuscate the logical order of tokens. Unless mitigated, an adversary could craft source code such that the ordering of tokens perceived by human reviewers does not match what will be processed by a compiler/interpreter/etc. The Unicode Consortium has documented this class of vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and in Unicode Standard Annex #31, Unicode Identifier and Pattern Syntax. Also, the BIDI specification allows applications to tailor the implementation in ways that can mitigate misleading visual reordering in program text; see HL4 in Unicode Standard Annex #9, Unicode Bidirectional Algorithm.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://access.redhat.com/security/cve/CVE-2021-42574
- https://trojansource.codes
- http://www.unicode.org/versions/Unicode14.0.0/
- http://www.openwall.com/lists/oss-security/2021/11/01/1
- https://access.redhat.com/errata/RHSA-2021:4033
- https://access.redhat.com/errata/RHSA-2021:4585
- https://access.redhat.com/errata/RHSA-2021:4586
- https://access.redhat.com/errata/RHSA-2021:4587
- https://access.redhat.com/errata/RHSA-2021:4590
- https://access.redhat.com/errata/RHSA-2021:4591
- https://access.redhat.com/errata/RHSA-2021:4592
- https://access.redhat.com/errata/RHSA-2021:4593
- https://access.redhat.com/errata/RHSA-2021:4594
- https://access.redhat.com/errata/RHSA-2021:4595
- https://access.redhat.com/errata/RHSA-2021:4649
- https://access.redhat.com/errata/RHSA-2021:4743
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- http://www.openwall.com/lists/oss-security/2021/11/01/4
- http://www.openwall.com/lists/oss-security/2021/11/01/5
- http://www.openwall.com/lists/oss-security/2021/11/01/6
- http://www.openwall.com/lists/oss-security/2021/11/02/10
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- https://security.gentoo.org/glsa/202210-09
- https://www.kb.cert.org/vuls/id/999008
- https://www.scyon.nl/post/trojans-in-your-source-code
- https://www.starwindsoftware.com/security/sw-20220804-0002/
- https://www.unicode.org/reports/tr31/
- https://www.unicode.org/reports/tr36/
- https://www.unicode.org/reports/tr39/
- https://www.unicode.org/reports/tr9/tr9-44.html#HL4
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard and the Unicode Bidirectional Algorithm (all versions). Due to text display behavior when text includes left-to-right and right-to-left characters, the visual order of tokens may be different from their logical order. Additionally, control characters needed to fully support the requirements of bidirectional text can further obfuscate the logical order of tokens. Unless mitigated, an adversary could craft source code such that the ordering of tokens perceived by human reviewers does not match what will be processed by a compiler/interpreter/etc. The Unicode Consortium has documented this class of vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and in Unicode Standard Annex #31, Unicode Identifier and Pattern Syntax. Also, the BIDI specification allows applications to tailor the implementation in ways that can mitigate misleading visual reordering in program text; see HL4 in Unicode Standard Annex #9, Unicode Bidirectional Algorithm.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://access.redhat.com/security/cve/CVE-2021-42574
- https://trojansource.codes
- http://www.unicode.org/versions/Unicode14.0.0/
- http://www.openwall.com/lists/oss-security/2021/11/01/1
- https://access.redhat.com/errata/RHSA-2021:4033
- https://access.redhat.com/errata/RHSA-2021:4585
- https://access.redhat.com/errata/RHSA-2021:4586
- https://access.redhat.com/errata/RHSA-2021:4587
- https://access.redhat.com/errata/RHSA-2021:4590
- https://access.redhat.com/errata/RHSA-2021:4591
- https://access.redhat.com/errata/RHSA-2021:4592
- https://access.redhat.com/errata/RHSA-2021:4593
- https://access.redhat.com/errata/RHSA-2021:4594
- https://access.redhat.com/errata/RHSA-2021:4595
- https://access.redhat.com/errata/RHSA-2021:4649
- https://access.redhat.com/errata/RHSA-2021:4743
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- http://www.openwall.com/lists/oss-security/2021/11/01/4
- http://www.openwall.com/lists/oss-security/2021/11/01/5
- http://www.openwall.com/lists/oss-security/2021/11/01/6
- http://www.openwall.com/lists/oss-security/2021/11/02/10
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
- https://security.gentoo.org/glsa/202210-09
- https://www.kb.cert.org/vuls/id/999008
- https://www.scyon.nl/post/trojans-in-your-source-code
- https://www.starwindsoftware.com/security/sw-20220804-0002/
- https://www.unicode.org/reports/tr31/
- https://www.unicode.org/reports/tr36/
- https://www.unicode.org/reports/tr39/
- https://www.unicode.org/reports/tr9/tr9-44.html#HL4
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when --no-clobber is used together with --remove-on-error.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when --no-clobber is used together with --remove-on-error.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
- https://access.redhat.com/security/cve/CVE-2020-13790
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/
- https://security.gentoo.org/glsa/202010-03
- https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a
- https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
- https://lists.debian.org/debian-lts-announce/2020/07/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html
- https://usn.ubuntu.com/4386-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://access.redhat.com/security/cve/CVE-2025-5987
- https://bugzilla.redhat.com/show_bug.cgi?id=2376219
- https://access.redhat.com/errata/RHSA-2025:23484
- https://access.redhat.com/errata/RHSA-2025:23483
- https://access.redhat.com/errata/RHSA-2026:0427
- https://access.redhat.com/errata/RHSA-2026:0428
- https://access.redhat.com/errata/RHSA-2026:0430
- https://access.redhat.com/errata/RHSA-2026:0431
- https://access.redhat.com/errata/RHSA-2026:0702
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98877
- https://source.android.com/security/bulletin/2017-06-01
- https://access.redhat.com/security/cve/CVE-2017-0663
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.securitytracker.com/id/1038623
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2022-23308
- https://access.redhat.com/errata/RHSA-2022:0899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
- http://seclists.org/fulldisclosure/2022/May/33
- http://seclists.org/fulldisclosure/2022/May/34
- http://seclists.org/fulldisclosure/2022/May/35
- http://seclists.org/fulldisclosure/2022/May/36
- http://seclists.org/fulldisclosure/2022/May/37
- http://seclists.org/fulldisclosure/2022/May/38
- https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
- https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
- https://security.gentoo.org/glsa/202210-03
- https://security.netapp.com/advisory/ntap-20220331-0008/
- https://support.apple.com/kb/HT213253
- https://support.apple.com/kb/HT213254
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213258
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98877
- https://source.android.com/security/bulletin/2017-06-01
- https://access.redhat.com/security/cve/CVE-2017-0663
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.securitytracker.com/id/1038623
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2022-23308
- https://access.redhat.com/errata/RHSA-2022:0899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
- http://seclists.org/fulldisclosure/2022/May/33
- http://seclists.org/fulldisclosure/2022/May/34
- http://seclists.org/fulldisclosure/2022/May/35
- http://seclists.org/fulldisclosure/2022/May/36
- http://seclists.org/fulldisclosure/2022/May/37
- http://seclists.org/fulldisclosure/2022/May/38
- https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
- https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
- https://security.gentoo.org/glsa/202210-03
- https://security.netapp.com/advisory/ntap-20220331-0008/
- https://support.apple.com/kb/HT213253
- https://support.apple.com/kb/HT213254
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213258
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- http://www.securityfocus.com/bid/90691
- https://support.apple.com/HT206564
- https://support.apple.com/HT206566
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://access.redhat.com/security/cve/CVE-2016-1841
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- http://www.securitytracker.com/id/1035890
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: lz4
- Introduced through: lz4@1.7.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › lz4@1.7.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream lz4 package and not the lz4 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
Remediation
There is no fixed version for Centos:7 lz4.
References
- https://access.redhat.com/security/cve/CVE-2019-17543
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
- https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
- https://github.com/lz4/lz4/issues/801
- https://github.com/lz4/lz4/pull/756
- https://github.com/lz4/lz4/pull/760
- https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
- https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
- https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
- https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E
- https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E
- https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E
- https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E
- https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E
- https://security.netapp.com/advisory/ntap-20210723-0001/
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://security.netapp.com/advisory/ntap-20210129-0001/
- https://access.redhat.com/security/cve/CVE-2019-17006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2020:4076
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2017-1000158
- https://www.debian.org/security/2018/dsa-4307
- https://security.gentoo.org/glsa/201805-02
- https://bugs.python.org/issue30657
- https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
- https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
- http://www.securitytracker.com/id/1039890
- https://security.netapp.com/advisory/ntap-20230216-0001/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-1000158
- https://www.debian.org/security/2018/dsa-4307
- https://security.gentoo.org/glsa/201805-02
- https://bugs.python.org/issue30657
- https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
- https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
- http://www.securitytracker.com/id/1039890
- https://security.netapp.com/advisory/ntap-20230216-0001/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.
Remediation
There is no fixed version for Centos:7 sqlite.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
medium severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.
Remediation
There is no fixed version for Centos:7 cairo.
References
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-27828
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COBEVDBUO3QTNR6YQBBTIQKNIB6W3MJ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBZZ2SNTQ4BSA6PNJCTOAKXIAXYNNF6V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://bugzilla.redhat.com/show_bug.cgi?id=1905201
- https://github.com/jasper-software/jasper/issues/252
- https://access.redhat.com/errata/RHSA-2021:4235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COBEVDBUO3QTNR6YQBBTIQKNIB6W3MJ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EBZZ2SNTQ4BSA6PNJCTOAKXIAXYNNF6V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
medium severity
- Vulnerable module: json-c
- Introduced through: json-c@0.11-4.el7_0
Detailed paths
-
Introduced through: jboss/base-jdk@8 › json-c@0.11-4.el7_0
NVD Description
Note: Versions mentioned in the description apply only to the upstream json-c package and not the json-c package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
Remediation
There is no fixed version for Centos:7 json-c.
References
- https://github.com/json-c/json-c/pull/592
- https://security.netapp.com/advisory/ntap-20210521-0001/
- https://access.redhat.com/security/cve/CVE-2020-12762
- https://www.debian.org/security/2020/dsa-4741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
- https://security.gentoo.org/glsa/202006-13
- https://github.com/rsyslog/libfastjson/issues/161
- https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
- https://access.redhat.com/errata/RHSA-2021:4382
- https://usn.ubuntu.com/4360-1/
- https://usn.ubuntu.com/4360-4/
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
- https://lists.debian.org/debian-lts-announce/2025/07/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
medium severity
- Vulnerable module: libcap
- Introduced through: libcap@2.22-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcap@2.22-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcap package and not the libcap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
Remediation
There is no fixed version for Centos:7 libcap.
References
- https://access.redhat.com/security/cve/CVE-2023-2603
- https://bugzilla.redhat.com/show_bug.cgi?id=2209113
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
medium severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcom_err@1.42.9-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
Remediation
There is no fixed version for Centos:7 libcom_err.
References
- http://www.securityfocus.com/bid/72520
- http://www.securityfocus.com/archive/1/534633/100/0/threaded
- http://advisories.mageia.org/MGASA-2015-0061.html
- http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
- https://bugzilla.redhat.com/show_bug.cgi?id=1187032
- https://access.redhat.com/security/cve/CVE-2015-0247
- http://www.debian.org/security/2015/dsa-3166
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
- https://security.gentoo.org/glsa/201701-06
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
- http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
- http://www.ocert.org/advisories/ocert-2015-002.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
- http://www.ubuntu.com/usn/USN-2507-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
medium severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
- https://access.redhat.com/security/cve/CVE-2019-2201
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
- https://security.gentoo.org/glsa/202003-23
- https://source.android.com/security/bulletin/2019-11-01
- https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html
- https://usn.ubuntu.com/4190-1/
- https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280%40%3Ccommits.mxnet.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/05/msg00048.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://security.netapp.com/advisory/ntap-20210521-0009/
- https://access.redhat.com/security/cve/CVE-2020-35523
- https://www.debian.org/security/2021/dsa-4869
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://bugzilla.redhat.com/show_bug.cgi?id=1932040
- https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
- https://gitlab.com/libtiff/libtiff/-/merge_requests/160
- https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
- https://access.redhat.com/errata/RHSA-2021:4241
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/94406
- http://bugzilla.maptools.org/show_bug.cgi?id=2579
- https://access.redhat.com/security/cve/CVE-2016-9453
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/11/19/1
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://security.netapp.com/advisory/ntap-20210521-0009/
- https://access.redhat.com/security/cve/CVE-2020-35524
- https://www.debian.org/security/2021/dsa-4869
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://bugzilla.redhat.com/show_bug.cgi?id=1932044
- https://gitlab.com/libtiff/libtiff/-/merge_requests/159
- https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
- https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
- https://access.redhat.com/errata/RHSA-2021:4241
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2022-40304
- https://access.redhat.com/errata/RHSA-2023:0173
- https://access.redhat.com/errata/RHSA-2023:0338
- http://seclists.org/fulldisclosure/2022/Dec/21
- http://seclists.org/fulldisclosure/2022/Dec/24
- http://seclists.org/fulldisclosure/2022/Dec/25
- http://seclists.org/fulldisclosure/2022/Dec/26
- http://seclists.org/fulldisclosure/2022/Dec/27
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
- https://gitlab.gnome.org/GNOME/libxml2/-/tags
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://security.netapp.com/advisory/ntap-20210716-0005/
- https://access.redhat.com/security/cve/CVE-2021-3516
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954225
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2022-40304
- https://access.redhat.com/errata/RHSA-2023:0173
- https://access.redhat.com/errata/RHSA-2023:0338
- http://seclists.org/fulldisclosure/2022/Dec/21
- http://seclists.org/fulldisclosure/2022/Dec/24
- http://seclists.org/fulldisclosure/2022/Dec/25
- http://seclists.org/fulldisclosure/2022/Dec/26
- http://seclists.org/fulldisclosure/2022/Dec/27
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
- https://gitlab.gnome.org/GNOME/libxml2/-/tags
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://security.netapp.com/advisory/ntap-20210716-0005/
- https://access.redhat.com/security/cve/CVE-2021-3516
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1954225
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2023-29491
- http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://www.openwall.com/lists/oss-security/2023/04/19/10
- http://www.openwall.com/lists/oss-security/2023/04/19/11
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://security.netapp.com/advisory/ntap-20230517-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://www.openwall.com/lists/oss-security/2023/04/12/5
- https://www.openwall.com/lists/oss-security/2023/04/13/4
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2023-29491
- http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://www.openwall.com/lists/oss-security/2023/04/19/10
- http://www.openwall.com/lists/oss-security/2023/04/19/11
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://security.netapp.com/advisory/ntap-20230517-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://www.openwall.com/lists/oss-security/2023/04/12/5
- https://www.openwall.com/lists/oss-security/2023/04/13/4
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-29491
- http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- http://www.openwall.com/lists/oss-security/2023/04/19/10
- http://www.openwall.com/lists/oss-security/2023/04/19/11
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://security.netapp.com/advisory/ntap-20230517-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://www.openwall.com/lists/oss-security/2023/04/12/5
- https://www.openwall.com/lists/oss-security/2023/04/13/4
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2022-48565
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
- https://bugs.python.org/issue42051
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
- https://security.netapp.com/advisory/ntap-20231006-0007/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-48565
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
- https://bugs.python.org/issue42051
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
- https://security.netapp.com/advisory/ntap-20231006-0007/
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- https://access.redhat.com/security/cve/CVE-2021-3778
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- http://www.openwall.com/lists/oss-security/2021/10/01/1
- https://access.redhat.com/errata/RHSA-2021:4517
- https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://security.gentoo.org/glsa/202208-32
- https://security.netapp.com/advisory/ntap-20221118-0003/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-1629
- https://access.redhat.com/errata/RHSA-2022:5242
- https://access.redhat.com/errata/RHSA-2022:5319
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
- https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213488
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-0359
- https://access.redhat.com/errata/RHSA-2022:0894
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
- https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://security.gentoo.org/glsa/202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Use After Free
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- https://access.redhat.com/security/cve/CVE-2021-4192
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://access.redhat.com/errata/RHSA-2022:0366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- http://seclists.org/fulldisclosure/2022/Jul/14
- http://seclists.org/fulldisclosure/2022/Mar/29
- http://seclists.org/fulldisclosure/2022/May/35
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- https://security.gentoo.org/glsa/202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2025-13601
- https://bugzilla.redhat.com/show_bug.cgi?id=2416741
- https://gitlab.gnome.org/GNOME/glib/-/issues/3827
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
- https://access.redhat.com/errata/RHSA-2026:0936
- https://access.redhat.com/errata/RHSA-2026:0975
- https://access.redhat.com/errata/RHSA-2026:0991
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
Remediation
There is no fixed version for Centos:7 freetype.
References
- https://access.redhat.com/security/cve/CVE-2022-27404
- https://access.redhat.com/errata/RHSA-2022:7745
- https://access.redhat.com/errata/RHSA-2022:8340
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- https://security.gentoo.org/glsa/202402-06
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.2 or higher.
References
- https://kb.isc.org/docs/cve-2020-8623
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://access.redhat.com/security/cve/CVE-2020-8623
- https://www.debian.org/security/2020/dsa-4752
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
- https://security.gentoo.org/glsa/202008-19
- https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
- https://access.redhat.com/errata/RHSA-2020:5011
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
- https://usn.ubuntu.com/4468-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2017-14502
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=573
- https://bugs.debian.org/875974
- https://github.com/libarchive/libarchive/commit/5562545b5562f6d12a4ef991fae158bf4ccf92b6
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3859-1/
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations withoutTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2021-22946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
- https://hackerone.com/reports/1334111
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:4059
- http://seclists.org/fulldisclosure/2022/Mar/29
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20211029-0003/
- https://security.netapp.com/advisory/ntap-20220121-0008/
- https://support.apple.com/kb/HT213183
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) .. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-43551
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
- https://hackerone.com/reports/1755083
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230427-0007/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-27782
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- http://www.openwall.com/lists/oss-security/2023/03/20/6
- https://hackerone.com/reports/1555796
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a different URL usingthe wrong host name when it is later retrieved.For example, a URL like http://example.com%2F127.0.0.1/, would be allowed bythe parser and get transposed into http://example.com/127.0.0.1/. This flawcan be used to circumvent filters, checks and more.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2024-2398
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://www.openwall.com/lists/oss-security/2024/03/27/3
- https://curl.se/docs/CVE-2024-2398.html
- https://curl.se/docs/CVE-2024-2398.json
- https://hackerone.com/reports/2402845
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://security.netapp.com/advisory/ntap-20240503-0009/
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
medium severity
- Vulnerable module: cyrus-sasl-lib
- Introduced through: cyrus-sasl-lib@2.1.26-23.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cyrus-sasl-lib@2.1.26-23.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cyrus-sasl-lib package and not the cyrus-sasl-lib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
Remediation
There is no fixed version for Centos:7 cyrus-sasl-lib.
References
- https://seclists.org/bugtraq/2019/Dec/42
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211289
- https://access.redhat.com/security/cve/CVE-2019-19906
- https://www.debian.org/security/2019/dsa-4591
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
- http://seclists.org/fulldisclosure/2020/Jul/23
- http://seclists.org/fulldisclosure/2020/Jul/24
- https://github.com/cyrusimap/cyrus-sasl/issues/587
- https://www.openldap.org/its/index.cgi/Incoming?id=9123
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
- https://access.redhat.com/errata/RHSA-2020:4497
- https://usn.ubuntu.com/4256-1/
- http://www.openwall.com/lists/oss-security/2022/02/23/4
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-12.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-12.el7 or higher.
References
- https://seclists.org/bugtraq/2019/Dec/17
- https://seclists.org/bugtraq/2019/Dec/21
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Nov/1
- https://seclists.org/bugtraq/2019/Nov/24
- https://seclists.org/bugtraq/2019/Oct/29
- https://seclists.org/bugtraq/2019/Sep/30
- https://seclists.org/bugtraq/2019/Sep/37
- https://github.com/libexpat/libexpat/issues/342
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://www.tenable.com/security/tns-2021-11
- https://access.redhat.com/security/cve/CVE-2019-15903
- https://www.debian.org/security/2019/dsa-4530
- https://www.debian.org/security/2019/dsa-4549
- https://www.debian.org/security/2019/dsa-4571
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
- http://seclists.org/fulldisclosure/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://seclists.org/fulldisclosure/2019/Dec/27
- http://seclists.org/fulldisclosure/2019/Dec/30
- https://security.gentoo.org/glsa/201911-08
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/pull/318
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:3952
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://usn.ubuntu.com/4132-1/
- https://usn.ubuntu.com/4132-2/
- https://usn.ubuntu.com/4165-1/
- https://usn.ubuntu.com/4202-1/
- https://usn.ubuntu.com/4335-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2024-45490
- https://github.com/libexpat/libexpat/issues/887
- https://github.com/libexpat/libexpat/pull/890
- https://security.netapp.com/advisory/ntap-20241018-0004/
- http://seclists.org/fulldisclosure/2024/Dec/10
- http://seclists.org/fulldisclosure/2024/Dec/12
- http://seclists.org/fulldisclosure/2024/Dec/6
- http://seclists.org/fulldisclosure/2024/Dec/7
- http://seclists.org/fulldisclosure/2024/Dec/8
- https://lists.debian.org/debian-lts-announce/2024/09/msg00036.html
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
Remediation
There is no fixed version for Centos:7 expat.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/99276
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
- https://access.redhat.com/security/cve/CVE-2017-9233
- http://www.debian.org/security/2017/dsa-3898
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securitytracker.com/id/1039427
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
- Fixed in: 0:2.1.0-12.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
Remediation
Upgrade Centos:7 expat to version 0:2.1.0-12.el7 or higher.
References
- https://seclists.org/bugtraq/2019/Jun/39
- https://security.netapp.com/advisory/ntap-20190703-0001/
- https://support.f5.com/csp/article/K51011533
- https://www.tenable.com/security/tns-2021-11
- https://access.redhat.com/security/cve/CVE-2018-20843
- https://www.debian.org/security/2019/dsa-4472
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/
- https://security.gentoo.org/glsa/201911-08
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
- https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes
- https://github.com/libexpat/libexpat/issues/186
- https://github.com/libexpat/libexpat/pull/262
- https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:3952
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html
- https://usn.ubuntu.com/4040-1/
- https://usn.ubuntu.com/4040-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2023-52425
- https://lists.debian.org/debian-lts-announce/2024/09/msg00036.html
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/libexpat/libexpat/pull/789
- https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
- https://security.netapp.com/advisory/ntap-20240614-0003/
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2024-8176
- https://bugzilla.redhat.com/show_bug.cgi?id=2310137
- https://github.com/libexpat/libexpat/issues/893
- http://www.openwall.com/lists/oss-security/2025/03/15/1
- https://blog.hartwork.org/posts/expat-2-7-0-released/
- https://bugzilla.suse.com/show_bug.cgi?id=1239618
- https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52
- https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53
- https://security-tracker.debian.org/tracker/CVE-2024-8176
- https://ubuntu.com/security/CVE-2024-8176
- https://security.netapp.com/advisory/ntap-20250328-0009/
- https://access.redhat.com/errata/RHSA-2025:3531
- https://access.redhat.com/errata/RHSA-2025:3734
- https://access.redhat.com/errata/RHSA-2025:3913
- https://access.redhat.com/errata/RHSA-2025:4048
- https://access.redhat.com/errata/RHSA-2025:4447
- https://access.redhat.com/errata/RHSA-2025:4446
- https://access.redhat.com/errata/RHSA-2025:4448
- https://access.redhat.com/errata/RHSA-2025:4449
- https://www.kb.cert.org/vuls/id/760160
- https://access.redhat.com/errata/RHSA-2025:7444
- https://access.redhat.com/errata/RHSA-2025:7512
- https://access.redhat.com/errata/RHSA-2025:8385
- https://access.redhat.com/errata/RHSA-2025:13681
- http://seclists.org/fulldisclosure/2025/May/10
- http://seclists.org/fulldisclosure/2025/May/11
- http://seclists.org/fulldisclosure/2025/May/12
- http://seclists.org/fulldisclosure/2025/May/6
- http://seclists.org/fulldisclosure/2025/May/7
- http://seclists.org/fulldisclosure/2025/May/8
- http://www.openwall.com/lists/oss-security/2025/09/24/11
- https://access.redhat.com/errata/RHSA-2025:22033
- https://access.redhat.com/errata/RHSA-2025:22035
- https://access.redhat.com/errata/RHSA-2025:22034
- https://access.redhat.com/errata/RHSA-2025:22607
- https://access.redhat.com/errata/RHSA-2025:22785
- https://access.redhat.com/errata/RHSA-2025:22842
- https://access.redhat.com/errata/RHSA-2025:22871
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2022-43680
- https://access.redhat.com/errata/RHSA-2023:0103
- https://access.redhat.com/errata/RHSA-2023:0337
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/
- http://www.openwall.com/lists/oss-security/2023/12/28/5
- http://www.openwall.com/lists/oss-security/2024/01/03/5
- https://github.com/libexpat/libexpat/issues/649
- https://github.com/libexpat/libexpat/pull/616
- https://github.com/libexpat/libexpat/pull/650
- https://lists.debian.org/debian-lts-announce/2022/10/msg00033.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/
- https://security.gentoo.org/glsa/202210-38
- https://security.netapp.com/advisory/ntap-20221118-0007/
- https://www.debian.org/security/2022/dsa-5266
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://security.netapp.com/advisory/ntap-20210319-0004/
- https://access.redhat.com/security/cve/CVE-2021-27218
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
- https://security.gentoo.org/glsa/202107-13
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:3058
- https://access.redhat.com/errata/RHSA-2021:4526
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://security.netapp.com/advisory/ntap-20190315-0002/
- https://support.f5.com/csp/article/K64119434
- https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2009-5155
- http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
- https://sourceware.org/bugzilla/show_bug.cgi?id=11053
- https://sourceware.org/bugzilla/show_bug.cgi?id=18986
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
- https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2023-5156
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.gentoo.org/glsa/202402-01
- https://bugzilla.redhat.com/show_bug.cgi?id=2240541
- https://sourceware.org/bugzilla/show_bug.cgi?id=30884
- https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/98339
- https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
- https://sourceware.org/bugzilla/show_bug.cgi?id=21461
- https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
- http://www.openwall.com/lists/oss-security/2017/05/05/2
- https://access.redhat.com/security/cve/CVE-2017-8804
- https://seclists.org/oss-sec/2017/q2/228
- https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
- https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210122-0004/
- https://access.redhat.com/security/cve/CVE-2020-29573
- https://security.gentoo.org/glsa/202101-20
- https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
- https://access.redhat.com/errata/RHSA-2021:0348
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://security.netapp.com/advisory/ntap-20190315-0002/
- https://support.f5.com/csp/article/K64119434
- https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2009-5155
- http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
- https://sourceware.org/bugzilla/show_bug.cgi?id=11053
- https://sourceware.org/bugzilla/show_bug.cgi?id=18986
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
- https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2023-5156
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.gentoo.org/glsa/202402-01
- https://bugzilla.redhat.com/show_bug.cgi?id=2240541
- https://sourceware.org/bugzilla/show_bug.cgi?id=30884
- https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/98339
- https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
- https://sourceware.org/bugzilla/show_bug.cgi?id=21461
- https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
- http://www.openwall.com/lists/oss-security/2017/05/05/2
- https://access.redhat.com/security/cve/CVE-2017-8804
- https://seclists.org/oss-sec/2017/q2/228
- https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
- https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210122-0004/
- https://access.redhat.com/security/cve/CVE-2020-29573
- https://security.gentoo.org/glsa/202101-20
- https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
- https://access.redhat.com/errata/RHSA-2021:0348
medium severity
- Vulnerable module: harfbuzz
- Introduced through: harfbuzz@1.7.5-2.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › harfbuzz@1.7.5-2.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream harfbuzz package and not the harfbuzz package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Remediation
There is no fixed version for Centos:7 harfbuzz.
References
- https://access.redhat.com/security/cve/CVE-2023-25193
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/
- https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
- https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh
- https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/
- https://security.netapp.com/advisory/ntap-20230725-0006/
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk.
References
- https://access.redhat.com/security/cve/CVE-2017-10118
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99782
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk.
References
- https://access.redhat.com/security/cve/CVE-2017-10176
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99788
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-devel.
References
- https://access.redhat.com/security/cve/CVE-2017-10118
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99782
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-devel.
References
- https://access.redhat.com/security/cve/CVE-2017-10176
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99788
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-headless.
References
- https://access.redhat.com/security/cve/CVE-2017-10118
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99782
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-headless.
References
- https://access.redhat.com/security/cve/CVE-2017-10176
- http://www.debian.org/security/2017/dsa-3919
- http://www.debian.org/security/2017/dsa-3954
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/99788
- http://www.securitytracker.com/id/1038931
- https://access.redhat.com/errata/RHSA-2017:1790
- https://access.redhat.com/errata/RHSA-2017:1791
- https://cert.vde.com/en-us/advisories/vde-2017-002
- https://security.gentoo.org/glsa/201709-22
- https://security.netapp.com/advisory/ntap-20170720-0001/
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
- https://access.redhat.com/security/cve/CVE-2021-36222
- https://www.debian.org/security/2021/dsa-4944
- https://github.com/krb5/krb5/releases
- https://web.mit.edu/kerberos/advisories/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:3576
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://security.netapp.com/advisory/ntap-20211104-0007/
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
- https://security.netapp.com/advisory/ntap-20201202-0001/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://access.redhat.com/security/cve/CVE-2020-28196
- https://www.debian.org/security/2020/dsa-4795
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
- https://security.gentoo.org/glsa/202011-17
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
- https://access.redhat.com/errata/RHSA-2021:1593
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2017-14502
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=573
- https://bugs.debian.org/875974
- https://github.com/libarchive/libarchive/commit/5562545b5562f6d12a4ef991fae158bf4ccf92b6
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3859-1/
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.
Remediation
There is no fixed version for Centos:7 libarchive.
References
medium severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-17.el7
- Fixed in: 0:1.42.9-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcom_err@1.42.9-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
Remediation
Upgrade Centos:7 libcom_err to version 0:1.42.9-19.el7 or higher.
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
- https://access.redhat.com/security/cve/CVE-2019-5188
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
- https://access.redhat.com/errata/RHSA-2020:4011
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
- https://usn.ubuntu.com/4249-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
- https://security.netapp.com/advisory/ntap-20220506-0001/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations withoutTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2021-22946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
- https://hackerone.com/reports/1334111
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:4059
- http://seclists.org/fulldisclosure/2022/Mar/29
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20211029-0003/
- https://security.netapp.com/advisory/ntap-20220121-0008/
- https://support.apple.com/kb/HT213183
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) .. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-43551
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
- https://hackerone.com/reports/1755083
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230427-0007/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-27782
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- http://www.openwall.com/lists/oss-security/2023/03/20/6
- https://hackerone.com/reports/1555796
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a different URL usingthe wrong host name when it is later retrieved.For example, a URL like http://example.com%2F127.0.0.1/, would be allowed bythe parser and get transposed into http://example.com/127.0.0.1/. This flawcan be used to circumvent filters, checks and more.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2024-2398
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://www.openwall.com/lists/oss-security/2024/03/27/3
- https://curl.se/docs/CVE-2024-2398.html
- https://curl.se/docs/CVE-2024-2398.json
- https://hackerone.com/reports/2402845
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://security.netapp.com/advisory/ntap-20240503-0009/
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28362
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:5493
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42559
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://go.dev/cl/269658
- https://go.dev/issue/42559
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://pkg.go.dev/vuln/GO-2022-0475
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28367
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42556
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://go.dev/cl/267277
- https://go.dev/issue/42556
- https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
- https://pkg.go.dev/vuln/GO-2022-0476
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
- https://security.netapp.com/advisory/ntap-20200924-0002/
- https://access.redhat.com/security/cve/CVE-2020-16845
- https://www.debian.org/security/2021/dsa-4848
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
- https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
- https://access.redhat.com/errata/RHSA-2020:3665
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
- https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
- https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.
Remediation
There is no fixed version for Centos:7 libgcc.
References
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2021-33560
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
- https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
- https://dev.gnupg.org/T5305
- https://dev.gnupg.org/T5328
- https://dev.gnupg.org/T5466
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
- https://access.redhat.com/errata/RHSA-2021:4409
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
- https://security.gentoo.org/glsa/202210-13
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
- Fixed in: 0:1.8.0-4.el7_9.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
Remediation
Upgrade Centos:7 libssh2 to version 0:1.8.0-4.el7_9.1 or higher.
References
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28362
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:5493
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28367
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42556
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://go.dev/cl/267277
- https://go.dev/issue/42556
- https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
- https://pkg.go.dev/vuln/GO-2022-0476
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42559
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://go.dev/cl/269658
- https://go.dev/issue/42559
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://pkg.go.dev/vuln/GO-2022-0475
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
- https://security.netapp.com/advisory/ntap-20200924-0002/
- https://access.redhat.com/security/cve/CVE-2020-16845
- https://www.debian.org/security/2021/dsa-4848
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
- https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
- https://access.redhat.com/errata/RHSA-2020:3665
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
- https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
- https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
medium severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
- https://bugzilla.redhat.com/show_bug.cgi?id=1535926
- https://bugzilla.suse.com/show_bug.cgi?id=1076832
- https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
- https://access.redhat.com/security/cve/CVE-2018-6003
- https://www.debian.org/security/2018/dsa-4106
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/102124
- https://access.redhat.com/security/cve/CVE-2017-17095
- https://www.debian.org/security/2018/dsa-4349
- https://www.exploit-db.com/exploits/43322/
- https://security.gentoo.org/glsa/202003-25
- http://bugzilla.maptools.org/show_bug.cgi?id=2750
- http://www.openwall.com/lists/oss-security/2017/11/30/3
- https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
- https://usn.ubuntu.com/3606-1/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-52356
- https://access.redhat.com/errata/RHSA-2024:5079
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://access.redhat.com/errata/RHSA-2025:20801
- https://access.redhat.com/errata/RHSA-2025:21994
- https://access.redhat.com/errata/RHSA-2025:23078
- https://access.redhat.com/errata/RHSA-2025:23079
- https://access.redhat.com/errata/RHSA-2025:23080
- https://bugzilla.redhat.com/show_bug.cgi?id=2251344
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A null pointer dereference flaw was found in Libtiff via tif_dirinfo.c. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2024-7006
- https://bugzilla.redhat.com/show_bug.cgi?id=2302996
- https://access.redhat.com/errata/RHSA-2024:6360
- https://access.redhat.com/errata/RHSA-2024:8833
- https://access.redhat.com/errata/RHSA-2024:8914
- https://security.netapp.com/advisory/ntap-20240920-0001/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the "invertImage()" function in the component "tiffcrop".
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2020-19131
- http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
- http://bugzilla.maptools.org/show_bug.cgi?id=2831
- https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
- https://access.redhat.com/errata/RHSA-2022:1810
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-52355
- https://access.redhat.com/errata/RHSA-2025:20801
- https://access.redhat.com/errata/RHSA-2025:21994
- https://access.redhat.com/errata/RHSA-2025:23078
- https://access.redhat.com/errata/RHSA-2025:23079
- https://access.redhat.com/errata/RHSA-2025:23080
- https://bugzilla.redhat.com/show_bug.cgi?id=2251326
- https://gitlab.com/libtiff/libtiff/-/issues/621
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98599
- https://access.redhat.com/security/cve/CVE-2017-9047
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
- https://bugzilla.gnome.org/show_bug.cgi?id=759579
- https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
- http://xmlsoft.org/news.html
- https://access.redhat.com/security/cve/CVE-2017-16932
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
- https://usn.ubuntu.com/3739-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://bugzilla.gnome.org/show_bug.cgi?id=766956
- https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
- http://xmlsoft.org/news.html
- https://access.redhat.com/security/cve/CVE-2017-16931
- https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2022-40303
- https://access.redhat.com/errata/RHSA-2023:0173
- https://access.redhat.com/errata/RHSA-2023:0338
- http://seclists.org/fulldisclosure/2022/Dec/21
- http://seclists.org/fulldisclosure/2022/Dec/24
- http://seclists.org/fulldisclosure/2022/Dec/25
- http://seclists.org/fulldisclosure/2022/Dec/26
- http://seclists.org/fulldisclosure/2022/Dec/27
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
Remediation
Upgrade Centos:7 libxml2 to version 0:2.9.1-6.el7.5 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://access.redhat.com/security/cve/CVE-2020-7595
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://security.gentoo.org/glsa/202010-04
- https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- https://usn.ubuntu.com/4274-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
Remediation
Upgrade Centos:7 libxml2 to version 0:2.9.1-6.el7.5 or higher.
References
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://access.redhat.com/security/cve/CVE-2019-20388
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://security.gentoo.org/glsa/202010-04
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
Remediation
Upgrade Centos:7 libxml2 to version 0:2.9.1-6.el7.5 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://access.redhat.com/security/cve/CVE-2019-19956
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
- https://usn.ubuntu.com/4274-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://access.redhat.com/security/cve/CVE-2021-3537
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1956522
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98599
- https://access.redhat.com/security/cve/CVE-2017-9047
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
- https://bugzilla.gnome.org/show_bug.cgi?id=759579
- https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
- http://xmlsoft.org/news.html
- https://access.redhat.com/security/cve/CVE-2017-16932
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
- https://usn.ubuntu.com/3739-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://bugzilla.gnome.org/show_bug.cgi?id=766956
- https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
- http://xmlsoft.org/news.html
- https://access.redhat.com/security/cve/CVE-2017-16931
- https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2022-40303
- https://access.redhat.com/errata/RHSA-2023:0173
- https://access.redhat.com/errata/RHSA-2023:0338
- http://seclists.org/fulldisclosure/2022/Dec/21
- http://seclists.org/fulldisclosure/2022/Dec/24
- http://seclists.org/fulldisclosure/2022/Dec/25
- http://seclists.org/fulldisclosure/2022/Dec/26
- http://seclists.org/fulldisclosure/2022/Dec/27
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
Remediation
Upgrade Centos:7 libxml2-python to version 0:2.9.1-6.el7.5 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://access.redhat.com/security/cve/CVE-2020-7595
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://security.gentoo.org/glsa/202010-04
- https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- https://usn.ubuntu.com/4274-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
Remediation
Upgrade Centos:7 libxml2-python to version 0:2.9.1-6.el7.5 or higher.
References
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://access.redhat.com/security/cve/CVE-2019-20388
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://security.gentoo.org/glsa/202010-04
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7.5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
Remediation
Upgrade Centos:7 libxml2-python to version 0:2.9.1-6.el7.5 or higher.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://access.redhat.com/security/cve/CVE-2019-19956
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2020:3996
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
- https://usn.ubuntu.com/4274-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://access.redhat.com/security/cve/CVE-2021-3537
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://security.gentoo.org/glsa/202107-05
- https://bugzilla.redhat.com/show_bug.cgi?id=1956522
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2021:2569
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
- Fixed in: 0:1.1.28-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
Remediation
Upgrade Centos:7 libxslt to version 0:1.1.28-6.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20191031-0004/
- https://security.netapp.com/advisory/ntap-20200416-0004/
- https://access.redhat.com/security/cve/CVE-2019-18197
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914
- https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
- https://lists.debian.org/debian-lts-announce/2019/10/msg00037.html
- http://www.openwall.com/lists/oss-security/2019/11/17/2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:4005
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
- https://usn.ubuntu.com/4164-1/
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-7.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-7.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-25648
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://bugzilla.redhat.com/show_bug.cgi?id=1887319
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1384
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Remediation
There is no fixed version for Centos:7 nss.
References
- http://www.securityfocus.com/bid/92630
- http://www.securityfocus.com/bid/95568
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/security/cve/cve-2016-2183
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://access.redhat.com/security/cve/CVE-2016-2183
- https://security.gentoo.org/glsa/201612-16
- https://security.gentoo.org/glsa/201701-65
- https://security.gentoo.org/glsa/201707-01
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://sweet32.info/
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- https://access.redhat.com/errata/RHSA-2017:1216
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2018:2123
- https://access.redhat.com/errata/RHSA-2019:1245
- https://access.redhat.com/errata/RHSA-2019:2859
- https://access.redhat.com/errata/RHSA-2020:0451
- https://access.redhat.com/errata/RHSA-2017:0336
- https://access.redhat.com/errata/RHSA-2017:0338
- https://access.redhat.com/errata/RHSA-2017:0462
- http://www.securitytracker.com/id/1036696
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- https://access.redhat.com/errata/RHBA-2019:2581
- https://access.redhat.com/errata/RHSA-2016:1940
- https://access.redhat.com/errata/RHSA-2017:0337
- https://access.redhat.com/errata/RHSA-2020:3842
- https://access.redhat.com/errata/RHSA-2021:0308
- https://access.redhat.com/errata/RHSA-2021:2438
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://seclists.org/fulldisclosure/2017/May/105
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://www.ubuntu.com/usn/USN-3270-1
- http://www.ubuntu.com/usn/USN-3372-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://seclists.org/bugtraq/2018/Nov/21
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.exploit-db.com/exploits/42091/
- https://www.exploit-db.com/exploits/42091
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-7.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-7.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-25648
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://bugzilla.redhat.com/show_bug.cgi?id=1887319
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1384
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- http://www.securityfocus.com/bid/92630
- http://www.securityfocus.com/bid/95568
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/security/cve/cve-2016-2183
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://access.redhat.com/security/cve/CVE-2016-2183
- https://security.gentoo.org/glsa/201612-16
- https://security.gentoo.org/glsa/201701-65
- https://security.gentoo.org/glsa/201707-01
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://sweet32.info/
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- https://access.redhat.com/errata/RHSA-2017:1216
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2018:2123
- https://access.redhat.com/errata/RHSA-2019:1245
- https://access.redhat.com/errata/RHSA-2019:2859
- https://access.redhat.com/errata/RHSA-2020:0451
- https://access.redhat.com/errata/RHSA-2017:0336
- https://access.redhat.com/errata/RHSA-2017:0338
- https://access.redhat.com/errata/RHSA-2017:0462
- http://www.securitytracker.com/id/1036696
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- https://access.redhat.com/errata/RHBA-2019:2581
- https://access.redhat.com/errata/RHSA-2016:1940
- https://access.redhat.com/errata/RHSA-2017:0337
- https://access.redhat.com/errata/RHSA-2020:3842
- https://access.redhat.com/errata/RHSA-2021:0308
- https://access.redhat.com/errata/RHSA-2021:2438
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://seclists.org/fulldisclosure/2017/May/105
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://www.ubuntu.com/usn/USN-3270-1
- http://www.ubuntu.com/usn/USN-3372-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://seclists.org/bugtraq/2018/Nov/21
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.exploit-db.com/exploits/42091/
- https://www.exploit-db.com/exploits/42091
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-7.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-7.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-25648
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://bugzilla.redhat.com/show_bug.cgi?id=1887319
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1384
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- http://www.securityfocus.com/bid/92630
- http://www.securityfocus.com/bid/95568
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/security/cve/cve-2016-2183
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://access.redhat.com/security/cve/CVE-2016-2183
- https://security.gentoo.org/glsa/201612-16
- https://security.gentoo.org/glsa/201701-65
- https://security.gentoo.org/glsa/201707-01
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://sweet32.info/
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- https://access.redhat.com/errata/RHSA-2017:1216
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2018:2123
- https://access.redhat.com/errata/RHSA-2019:1245
- https://access.redhat.com/errata/RHSA-2019:2859
- https://access.redhat.com/errata/RHSA-2020:0451
- https://access.redhat.com/errata/RHSA-2017:0336
- https://access.redhat.com/errata/RHSA-2017:0338
- https://access.redhat.com/errata/RHSA-2017:0462
- http://www.securitytracker.com/id/1036696
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- https://access.redhat.com/errata/RHBA-2019:2581
- https://access.redhat.com/errata/RHSA-2016:1940
- https://access.redhat.com/errata/RHSA-2017:0337
- https://access.redhat.com/errata/RHSA-2020:3842
- https://access.redhat.com/errata/RHSA-2021:0308
- https://access.redhat.com/errata/RHSA-2021:2438
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://seclists.org/fulldisclosure/2017/May/105
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://www.ubuntu.com/usn/USN-3270-1
- http://www.ubuntu.com/usn/USN-3372-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://seclists.org/bugtraq/2018/Nov/21
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.exploit-db.com/exploits/42091/
- https://www.exploit-db.com/exploits/42091
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11719
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36229
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9425
- https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36226
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9413
- https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
- https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
- https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
- https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36221
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9404
- https://bugs.openldap.org/show_bug.cgi?id=9424
- https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
- https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36228
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9427
- https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36227
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9428
- https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
- Fixed in: 0:2.4.44-23.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
Remediation
Upgrade Centos:7 openldap to version 0:2.4.44-23.el7_9 or higher.
References
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36223
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9408
- https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
- Fixed in: 0:2.4.44-25.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
Remediation
Upgrade Centos:7 openldap to version 0:2.4.44-25.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210716-0003/
- https://access.redhat.com/security/cve/CVE-2020-25710
- https://www.debian.org/security/2020/dsa-4792
- https://bugzilla.redhat.com/show_bug.cgi?id=1899678
- https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
- https://access.redhat.com/errata/RHSA-2022:0621
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
- Fixed in: 0:2.4.44-25.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
Remediation
Upgrade Centos:7 openldap to version 0:2.4.44-25.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210716-0003/
- https://support.apple.com/kb/HT212147
- https://access.redhat.com/security/cve/CVE-2020-25709
- https://www.debian.org/security/2020/dsa-4792
- http://seclists.org/fulldisclosure/2021/Feb/14
- https://bugzilla.redhat.com/show_bug.cgi?id=1899675
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
- https://access.redhat.com/errata/RHSA-2022:0621
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36222
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9406
- https://bugs.openldap.org/show_bug.cgi?id=9407
- https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
- https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
- https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36230
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9423
- https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36225
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9412
- https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
- https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
- https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
- https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210226-0002/
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212530
- https://support.apple.com/kb/HT212531
- https://access.redhat.com/security/cve/CVE-2020-36224
- https://www.debian.org/security/2021/dsa-4845
- http://seclists.org/fulldisclosure/2021/May/64
- http://seclists.org/fulldisclosure/2021/May/65
- http://seclists.org/fulldisclosure/2021/May/70
- https://bugs.openldap.org/show_bug.cgi?id=9409
- https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
- https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
- https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
- https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
- https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://security.netapp.com/advisory/ntap-20210319-0005/
- https://access.redhat.com/security/cve/CVE-2021-27212
- https://www.debian.org/security/2021/dsa-4860
- https://bugs.openldap.org/show_bug.cgi?id=9454
- https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
- https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
- Fixed in: 0:2.4.44-22.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
Remediation
Upgrade Centos:7 openldap to version 0:2.4.44-22.el7 or higher.
References
- https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES
- https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440
- https://security.netapp.com/advisory/ntap-20200511-0003/
- https://support.apple.com/kb/HT211289
- https://access.redhat.com/security/cve/CVE-2020-12243
- https://www.debian.org/security/2020/dsa-4666
- https://bugs.openldap.org/show_bug.cgi?id=9202
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html
- https://access.redhat.com/errata/RHSA-2020:4041
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html
- https://usn.ubuntu.com/4352-1/
- https://usn.ubuntu.com/4352-2/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-22.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-22.el7_9 or higher.
References
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-10
- https://access.redhat.com/security/cve/CVE-2021-23840
- https://www.debian.org/security/2021/dsa-4855
- https://security.gentoo.org/glsa/202103-03
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:3798
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.
The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.
This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.
Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream.
The OpenSSL cms and smime command line applications are similarly affected.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-0215
- https://access.redhat.com/errata/RHSA-2023:0946
- https://access.redhat.com/errata/RHSA-2023:1405
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20230427-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.openssl.org/news/secadv/20230207.txt
medium severity
- Vulnerable module: p11-kit
- Introduced through: p11-kit@0.23.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › p11-kit@0.23.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream p11-kit package and not the p11-kit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
Remediation
There is no fixed version for Centos:7 p11-kit.
References
- https://access.redhat.com/security/cve/CVE-2020-29361
- https://www.debian.org/security/2021/dsa-4822
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
- https://access.redhat.com/errata/RHSA-2021:1609
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: p11-kit-trust
- Introduced through: p11-kit-trust@0.23.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › p11-kit-trust@0.23.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream p11-kit-trust package and not the p11-kit-trust package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
Remediation
There is no fixed version for Centos:7 p11-kit-trust.
References
- https://access.redhat.com/security/cve/CVE-2020-29361
- https://www.debian.org/security/2021/dsa-4822
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
- https://access.redhat.com/errata/RHSA-2021:1609
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/97030
- https://bugs.exim.org/show_bug.cgi?id=2052
- https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
- https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
- https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
- https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
- https://access.redhat.com/security/cve/CVE-2017-7186
- https://security.gentoo.org/glsa/201710-09
- https://security.gentoo.org/glsa/201710-25
- https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
- https://access.redhat.com/errata/RHSA-2018:2486
medium severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/96295
- https://bugs.exim.org/show_bug.cgi?id=2035
- https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
- https://access.redhat.com/security/cve/CVE-2017-6004
- https://security.gentoo.org/glsa/201706-11
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- http://www.securitytracker.com/id/1037850
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-12084
- https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0
- https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4
- https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964
- https://github.com/python/cpython/issues/142145
- https://github.com/python/cpython/pull/142146
- https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437
- https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907
- https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d
- https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8
- https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af
- https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273
- https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
Remediation
There is no fixed version for Centos:7 python.
References
- https://security.netapp.com/advisory/ntap-20201123-0004/
- https://access.redhat.com/security/cve/CVE-2020-27619
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://bugs.python.org/issue41944
- https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
- https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
- https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
- https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
- https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1633
- https://access.redhat.com/errata/RHSA-2021:4151
- https://access.redhat.com/errata/RHSA-2021:4162
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://security.gentoo.org/glsa/202402-04
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-90.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-90.el7 or higher.
References
- https://bugs.python.org/issue39017
- https://github.com/python/cpython/pull/21454
- https://security.netapp.com/advisory/ntap-20200731-0002/
- https://access.redhat.com/security/cve/CVE-2019-20907
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
- https://security.gentoo.org/glsa/202008-01
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- https://access.redhat.com/errata/RHSA-2020:5009
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
- https://usn.ubuntu.com/4428-1/
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2020-10735
- https://access.redhat.com/errata/RHSA-2022:7323
- https://access.redhat.com/errata/RHSA-2023:0833
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
- https://access.redhat.com/errata/RHSA-2022:6766
- http://www.openwall.com/lists/oss-security/2022/09/21/1
- http://www.openwall.com/lists/oss-security/2022/09/21/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1834423
- https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y
- https://github.com/python/cpython/issues/95778
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-6232
- https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
- https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
- https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
- https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
- https://github.com/python/cpython/issues/121285
- https://github.com/python/cpython/pull/121286
- https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
- https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
- https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
- https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
- http://www.openwall.com/lists/oss-security/2024/09/03/5
- https://security.netapp.com/advisory/ntap-20241018-0007/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives.
This vulnerability can be mitigated by including the following patch after importing the “tarfile” module: https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-8194
- https://github.com/python/cpython/issues/130577
- https://github.com/python/cpython/pull/137027
- https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
- https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
- https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
- https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
- https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
- https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
- https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
- https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
- https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
- http://www.openwall.com/lists/oss-security/2025/07/28/1
- http://www.openwall.com/lists/oss-security/2025/07/28/2
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2022-45061
- https://access.redhat.com/errata/RHSA-2023:0833
- https://access.redhat.com/errata/RHSA-2023:0953
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
- https://github.com/python/cpython/issues/98433
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
- https://security.gentoo.org/glsa/202305-02
- https://security.netapp.com/advisory/ntap-20221209-0007/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free exists in Python through 3.9 via heappushpop in heapq.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2022-48560
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
- https://bugs.python.org/issue39421
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
- https://security.netapp.com/advisory/ntap-20230929-0008/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-12084
- https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0
- https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4
- https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964
- https://github.com/python/cpython/issues/142145
- https://github.com/python/cpython/pull/142146
- https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437
- https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907
- https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d
- https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8
- https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af
- https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273
- https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://security.netapp.com/advisory/ntap-20201123-0004/
- https://access.redhat.com/security/cve/CVE-2020-27619
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://bugs.python.org/issue41944
- https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
- https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
- https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
- https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
- https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1633
- https://access.redhat.com/errata/RHSA-2021:4151
- https://access.redhat.com/errata/RHSA-2021:4162
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://security.gentoo.org/glsa/202402-04
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-90.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-90.el7 or higher.
References
- https://bugs.python.org/issue39017
- https://github.com/python/cpython/pull/21454
- https://security.netapp.com/advisory/ntap-20200731-0002/
- https://access.redhat.com/security/cve/CVE-2019-20907
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
- https://security.gentoo.org/glsa/202008-01
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- https://access.redhat.com/errata/RHSA-2020:5009
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
- https://usn.ubuntu.com/4428-1/
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-10735
- https://access.redhat.com/errata/RHSA-2022:7323
- https://access.redhat.com/errata/RHSA-2023:0833
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
- https://access.redhat.com/errata/RHSA-2022:6766
- http://www.openwall.com/lists/oss-security/2022/09/21/1
- http://www.openwall.com/lists/oss-security/2022/09/21/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1834423
- https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y
- https://github.com/python/cpython/issues/95778
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-6232
- https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
- https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
- https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
- https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
- https://github.com/python/cpython/issues/121285
- https://github.com/python/cpython/pull/121286
- https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
- https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
- https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
- https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
- http://www.openwall.com/lists/oss-security/2024/09/03/5
- https://security.netapp.com/advisory/ntap-20241018-0007/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives.
This vulnerability can be mitigated by including the following patch after importing the “tarfile” module: https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-8194
- https://github.com/python/cpython/issues/130577
- https://github.com/python/cpython/pull/137027
- https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
- https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
- https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
- https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
- https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
- https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
- https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
- https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
- https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
- http://www.openwall.com/lists/oss-security/2025/07/28/1
- http://www.openwall.com/lists/oss-security/2025/07/28/2
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-45061
- https://access.redhat.com/errata/RHSA-2023:0833
- https://access.redhat.com/errata/RHSA-2023:0953
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
- https://github.com/python/cpython/issues/98433
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
- https://security.gentoo.org/glsa/202305-02
- https://security.netapp.com/advisory/ntap-20221209-0007/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free exists in Python through 3.9 via heappushpop in heapq.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-48560
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
- https://bugs.python.org/issue39421
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
- https://security.netapp.com/advisory/ntap-20230929-0008/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://access.redhat.com/security/cve/CVE-2019-19603
- https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
- https://www.sqlite.org/
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2021:4396
- https://usn.ubuntu.com/4394-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20200114-0001/
- https://access.redhat.com/security/cve/CVE-2019-19880
- https://www.debian.org/security/2020/dsa-4638
- https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:0514
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://usn.ubuntu.com/4298-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20190606-0002/
- https://access.redhat.com/security/cve/CVE-2019-8457
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.sqlite.org/releaselog/3_28_0.html
- https://www.sqlite.org/src/info/90acdbfce9c08858
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:1810
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
- https://usn.ubuntu.com/4004-1/
- https://usn.ubuntu.com/4004-2/
- https://usn.ubuntu.com/4019-1/
- https://usn.ubuntu.com/4019-2/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://access.redhat.com/security/cve/CVE-2019-20218
- https://security.gentoo.org/glsa/202007-26
- https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387
- https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:4442
- https://usn.ubuntu.com/4298-1/
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2021-3999
- https://access.redhat.com/errata/RHSA-2022:0896
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://bugzilla.redhat.com/show_bug.cgi?id=2024637
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security-tracker.debian.org/tracker/CVE-2021-3999
- https://security.netapp.com/advisory/ntap-20221104-0001/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28769
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://www.openwall.com/lists/oss-security/2022/01/24/4
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2021-3999
- https://access.redhat.com/errata/RHSA-2022:0896
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://bugzilla.redhat.com/show_bug.cgi?id=2024637
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security-tracker.debian.org/tracker/CVE-2021-3999
- https://security.netapp.com/advisory/ntap-20221104-0001/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28769
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://www.openwall.com/lists/oss-security/2022/01/24/4
medium severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
Remediation
There is no fixed version for Centos:7 libblkid.
References
- http://www.securityfocus.com/bid/71327
- https://bugzilla.redhat.com/show_bug.cgi?id=1168485
- https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
- https://access.redhat.com/security/cve/CVE-2014-9114
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
- https://security.gentoo.org/glsa/201612-14
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2014/11/26/21
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
Remediation
There is no fixed version for Centos:7 libmount.
References
- http://www.securityfocus.com/bid/71327
- https://bugzilla.redhat.com/show_bug.cgi?id=1168485
- https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
- https://access.redhat.com/security/cve/CVE-2014-9114
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
- https://security.gentoo.org/glsa/201612-14
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2014/11/26/21
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
Remediation
There is no fixed version for Centos:7 libuuid.
References
- http://www.securityfocus.com/bid/71327
- https://bugzilla.redhat.com/show_bug.cgi?id=1168485
- https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
- https://access.redhat.com/security/cve/CVE-2014-9114
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
- https://security.gentoo.org/glsa/201612-14
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2014/11/26/21
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2022-29824
- https://access.redhat.com/errata/RHSA-2022:5250
- https://access.redhat.com/errata/RHSA-2022:5317
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
- http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
- http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
- https://gitlab.gnome.org/GNOME/libxslt/-/tags
- https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
- https://security.gentoo.org/glsa/202210-03
- https://security.netapp.com/advisory/ntap-20220715-0006/
- https://www.debian.org/security/2022/dsa-5142
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2022-29824
- https://access.redhat.com/errata/RHSA-2022:5250
- https://access.redhat.com/errata/RHSA-2022:5317
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
- http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
- http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
- https://gitlab.gnome.org/GNOME/libxslt/-/tags
- https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
- https://security.gentoo.org/glsa/202210-03
- https://security.netapp.com/advisory/ntap-20220715-0006/
- https://www.debian.org/security/2022/dsa-5142
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12403
- https://bugzilla.redhat.com/show_bug.cgi?id=1868931
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://security.netapp.com/advisory/ntap-20230324-0006/
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://seclists.org/bugtraq/2019/Dec/23
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
- https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
- https://access.redhat.com/security/cve/CVE-2019-13565
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://www.openldap.org/its/index.cgi/?findid=9052
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
- https://usn.ubuntu.com/4078-1/
- https://usn.ubuntu.com/4078-2/
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.f5.com/csp/article/K98008862?utm_source=f5support&%3Butm_medium=RSS
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-23.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-23.el7_9 or higher.
References
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
- https://security.netapp.com/advisory/ntap-20210827-0010/
- https://www.openssl.org/news/secadv/20210824.txt
- https://www.tenable.com/security/tns-2021-16
- https://access.redhat.com/security/cve/CVE-2021-3712
- https://www.debian.org/security/2021/dsa-4963
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
- http://www.openwall.com/lists/oss-security/2021/08/26/2
- https://access.redhat.com/errata/RHSA-2022:0064
- https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E
- https://security.gentoo.org/glsa/202209-02
- https://security.gentoo.org/glsa/202210-02
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.tenable.com/security/tns-2022-02
medium severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
Remediation
There is no fixed version for Centos:7 util-linux.
References
- http://www.securityfocus.com/bid/71327
- https://bugzilla.redhat.com/show_bug.cgi?id=1168485
- https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
- https://access.redhat.com/security/cve/CVE-2014-9114
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
- https://security.gentoo.org/glsa/201612-14
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2014/11/26/21
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/107139
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://support.f5.com/csp/article/K00056379
- https://access.redhat.com/security/cve/CVE-2019-9077
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
- https://security.gentoo.org/glsa/202107-24
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2021-23177
- https://access.redhat.com/errata/RHSA-2022:0892
- https://bugzilla.redhat.com/show_bug.cgi?id=2024245
- https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad
- https://github.com/libarchive/libarchive/issues/1565
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2021-23177
- https://access.redhat.com/errata/RHSA-2022:0892
- https://bugzilla.redhat.com/show_bug.cgi?id=2024245
- https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad
- https://github.com/libarchive/libarchive/issues/1565
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
- https://access.redhat.com/security/cve/CVE-2017-7500
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2017-7501
- https://security.gentoo.org/glsa/201811-22
- https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7501
- https://security.gentoo.org/glsa/201811-22
- https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
- https://access.redhat.com/security/cve/CVE-2017-7500
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
- https://access.redhat.com/security/cve/CVE-2017-7500
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7501
- https://security.gentoo.org/glsa/201811-22
- https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
- https://access.redhat.com/security/cve/CVE-2017-7500
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2017-7501
- https://security.gentoo.org/glsa/201811-22
- https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- https://access.redhat.com/security/cve/CVE-2021-3984
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://access.redhat.com/errata/RHSA-2022:0366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://security.gentoo.org/glsa/202208-32
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-1621
- https://access.redhat.com/errata/RHSA-2022:5242
- https://access.redhat.com/errata/RHSA-2022:5319
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
- https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
- https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213488
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Use After Free
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- https://access.redhat.com/security/cve/CVE-2021-3796
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- http://www.openwall.com/lists/oss-security/2021/10/01/1
- https://access.redhat.com/errata/RHSA-2021:4517
- https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://security.gentoo.org/glsa/202208-32
- https://security.netapp.com/advisory/ntap-20221118-0004/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD). To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it. The update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2021-31566
- https://access.redhat.com/errata/RHSA-2022:0892
- https://bugzilla.redhat.com/show_bug.cgi?id=2024237
- https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043
- https://github.com/libarchive/libarchive/issues/1566
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process.
The exact cause of this issue is the function httpClose(con->http) being called in scheduler/client.c. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function cupsdAcceptClient if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in cupsd.conf) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from /etc/hosts.allow and /etc/hosts.deny.
Version 2.4.6 has a patch for this issue.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-34241
- http://www.openwall.com/lists/oss-security/2023/06/23/10
- http://www.openwall.com/lists/oss-security/2023/06/26/1
- https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
- https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
- https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
Remediation
There is no fixed version for Centos:7 freetype.
References
- https://access.redhat.com/security/cve/CVE-2022-27406
- https://access.redhat.com/errata/RHSA-2022:7745
- https://access.redhat.com/errata/RHSA-2022:8340
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- http://freetype.com
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- https://security.gentoo.org/glsa/202402-06
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
Remediation
There is no fixed version for Centos:7 freetype.
References
- https://access.redhat.com/security/cve/CVE-2022-27405
- https://access.redhat.com/errata/RHSA-2022:7745
- https://access.redhat.com/errata/RHSA-2022:8340
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- http://freetype.com
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
- https://security.gentoo.org/glsa/202402-06
medium severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
Remediation
There is no fixed version for Centos:7 giflib.
References
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://www.securityfocus.com/bid/101594
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
- https://bugzilla.redhat.com/show_bug.cgi?id=1504045
- https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
- https://github.com/krb5/krb5/pull/707
- https://access.redhat.com/security/cve/CVE-2017-15088
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2021-31566
- https://access.redhat.com/errata/RHSA-2022:0892
- https://bugzilla.redhat.com/show_bug.cgi?id=2024237
- https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043
- https://github.com/libarchive/libarchive/issues/1566
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
medium severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
- https://access.redhat.com/security/cve/CVE-2021-29390
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
- https://bugzilla.redhat.com/show_bug.cgi?id=1943797
- https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595
- https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-15366
- https://github.com/python/cpython/issues/143921
- https://github.com/python/cpython/pull/143922
- https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/
- https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-15367
- https://github.com/python/cpython/issues/143923
- https://github.com/python/cpython/pull/143924
- https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/
- https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-15366
- https://github.com/python/cpython/issues/143921
- https://github.com/python/cpython/pull/143922
- https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/
- https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-15367
- https://github.com/python/cpython/issues/143923
- https://github.com/python/cpython/pull/143924
- https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/
- https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- https://access.redhat.com/security/cve/CVE-2021-4019
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://access.redhat.com/errata/RHSA-2022:0366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://security.gentoo.org/glsa/202208-32
medium severity
- Vulnerable module: bash
- Introduced through: bash@4.2.46-34.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bash@4.2.46-34.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bash package and not the bash package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
Remediation
There is no fixed version for Centos:7 bash.
References
- http://www.securityfocus.com/bid/108824
- https://support.f5.com/csp/article/K05122252
- https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2012-6711
- http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
- https://bugzilla.redhat.com/show_bug.cgi?id=1721071
- https://usn.ubuntu.com/4180-1/
- https://support.f5.com/csp/article/K05122252?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 binutils.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2023-1579
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11d171f1910b508a81d21faa087ad1af573407d8
- https://security.gentoo.org/glsa/202309-15
- https://security.netapp.com/advisory/ntap-20230511-0009/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29988
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2021-20294
- https://bugzilla.redhat.com/show_bug.cgi?id=1943533
- https://sourceware.org/bugzilla/show_bug.cgi?id=26929
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/202208-30
- https://sourceware.org/git/?p=binutils-gdb.git%3Ba=patch%3Bh=372dd157272e0674d13372655cc60eaca9c06926
- https://github.com/tin-z/CVE-2021-20294-POC
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
Remediation
There is no fixed version for Centos:7 binutils.
References
medium severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
Remediation
There is no fixed version for Centos:7 cpio.
References
- https://access.redhat.com/security/cve/CVE-2021-38185
- https://github.com/fangqyi/cpiopwn
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://access.redhat.com/errata/RHSA-2022:1991
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-4504
- http://seclists.org/fulldisclosure/2024/Sep/33
- https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
- https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
- https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
- https://takeonme.org/cves/CVE-2023-4504.html
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
- Fixed in: 1:1.10.24-15.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
Remediation
Upgrade Centos:7 dbus to version 1:1.10.24-15.el7 or higher.
References
- http://www.securityfocus.com/bid/108751
- https://seclists.org/bugtraq/2019/Jun/16
- https://access.redhat.com/security/cve/CVE-2019-12749
- https://www.debian.org/security/2019/dsa-4462
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
- https://security.gentoo.org/glsa/201909-08
- https://www.openwall.com/lists/oss-security/2019/06/11/2
- https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
- http://www.openwall.com/lists/oss-security/2019/06/11/2
- https://access.redhat.com/errata/RHSA-2020:4032
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
- https://usn.ubuntu.com/4015-1/
- https://usn.ubuntu.com/4015-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
- https://security.netapp.com/advisory/ntap-20241206-0010/
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
- Fixed in: 1:1.10.24-15.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
Remediation
Upgrade Centos:7 dbus-libs to version 1:1.10.24-15.el7 or higher.
References
- http://www.securityfocus.com/bid/108751
- https://seclists.org/bugtraq/2019/Jun/16
- https://access.redhat.com/security/cve/CVE-2019-12749
- https://www.debian.org/security/2019/dsa-4462
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
- https://security.gentoo.org/glsa/201909-08
- https://www.openwall.com/lists/oss-security/2019/06/11/2
- https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
- http://www.openwall.com/lists/oss-security/2019/06/11/2
- https://access.redhat.com/errata/RHSA-2020:4032
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
- https://usn.ubuntu.com/4015-1/
- https://usn.ubuntu.com/4015-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
- https://security.netapp.com/advisory/ntap-20241206-0010/
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://www.securityfocus.com/bid/99093
- https://access.redhat.com/security/cve/CVE-2017-8105
- http://www.debian.org/security/2017/dsa-3839
- https://security.gentoo.org/glsa/201706-14
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://www.securityfocus.com/bid/99091
- https://access.redhat.com/security/cve/CVE-2017-8287
- http://www.debian.org/security/2017/dsa-3839
- https://security.gentoo.org/glsa/201706-14
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
medium severity
- Vulnerable module: fribidi
- Introduced through: fribidi@1.0.2-1.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › fribidi@1.0.2-1.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream fribidi package and not the fribidi package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.
Remediation
There is no fixed version for Centos:7 fribidi.
References
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2024-52533
- https://gitlab.gnome.org/GNOME/glib/-/issues/3461
- https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
- https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
- http://www.openwall.com/lists/oss-security/2024/11/12/11
- https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html
- https://security.netapp.com/advisory/ntap-20241206-0009/
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2022-23219
- https://access.redhat.com/errata/RHSA-2022:0896
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=22542
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2022-23218
- https://access.redhat.com/errata/RHSA-2022:0896
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=28768
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
- https://security.netapp.com/advisory/ntap-20200511-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25414
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
- https://access.redhat.com/security/cve/CVE-2020-1752
- https://security.gentoo.org/glsa/202101-20
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:4444
- https://usn.ubuntu.com/4416-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2022-23218
- https://access.redhat.com/errata/RHSA-2022:0896
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=28768
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2022-23219
- https://access.redhat.com/errata/RHSA-2022:0896
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=22542
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
- https://security.netapp.com/advisory/ntap-20200511-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25414
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
- https://access.redhat.com/security/cve/CVE-2020-1752
- https://security.gentoo.org/glsa/202101-20
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:4444
- https://usn.ubuntu.com/4416-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
medium severity
- Vulnerable module: gtk-update-icon-cache
- Introduced through: gtk-update-icon-cache@3.22.30-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gtk-update-icon-cache@3.22.30-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gtk-update-icon-cache package and not the gtk-update-icon-cache package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
Remediation
There is no fixed version for Centos:7 gtk-update-icon-cache.
References
- https://access.redhat.com/security/cve/CVE-2024-6655
- https://access.redhat.com/errata/RHSA-2024:6963
- https://access.redhat.com/errata/RHSA-2024:9184
- http://www.openwall.com/lists/oss-security/2024/09/09/1
- https://www.openwall.com/lists/oss-security/2024/09/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=2297098
- https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
medium severity
- Vulnerable module: gtk2
- Introduced through: gtk2@2.24.31-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gtk2@2.24.31-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gtk2 package and not the gtk2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
Remediation
There is no fixed version for Centos:7 gtk2.
References
- https://access.redhat.com/security/cve/CVE-2024-6655
- https://access.redhat.com/errata/RHSA-2024:6963
- https://access.redhat.com/errata/RHSA-2024:9184
- http://www.openwall.com/lists/oss-security/2024/09/09/1
- https://www.openwall.com/lists/oss-security/2024/09/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=2297098
- https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/95218
- http://bugzilla.maptools.org/show_bug.cgi?id=2620
- http://bugzilla.maptools.org/show_bug.cgi?id=2622
- https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a
- https://access.redhat.com/security/cve/CVE-2016-10092
- http://www.debian.org/security/2017/dsa-3762
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092
- http://www.openwall.com/lists/oss-security/2017/01/01/10
- http://www.openwall.com/lists/oss-security/2017/01/01/12
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap based buffer overflow in tools/tiff2pdf.c of LibTIFF 4.0.8 via a PlanarConfig=Contig image, which causes a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/95413
- http://bugzilla.maptools.org/show_bug.cgi?id=2656
- http://bugzilla.maptools.org/show_bug.cgi?id=2657
- https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
- https://access.redhat.com/security/cve/CVE-2017-5225
- http://www.debian.org/security/2017/dsa-3844
- https://security.gentoo.org/glsa/201709-27
- http://www.securitytracker.com/id/1037911
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/95215
- http://bugzilla.maptools.org/show_bug.cgi?id=2610
- https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec
- https://access.redhat.com/security/cve/CVE-2016-10093
- http://www.debian.org/security/2017/dsa-3762
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093
- http://www.openwall.com/lists/oss-security/2017/01/01/10
- http://www.openwall.com/lists/oss-security/2017/01/01/12
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/95214
- http://bugzilla.maptools.org/show_bug.cgi?id=2640
- https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76
- https://access.redhat.com/security/cve/CVE-2016-10094
- http://www.debian.org/security/2017/dsa-3762
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- http://www.openwall.com/lists/oss-security/2017/01/01/10
- http://www.openwall.com/lists/oss-security/2017/01/01/12
medium severity
- Vulnerable module: pixman
- Introduced through: pixman@0.34.0-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pixman@0.34.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pixman package and not the pixman package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.
Remediation
There is no fixed version for Centos:7 pixman.
References
- https://access.redhat.com/security/cve/CVE-2022-44638
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
- http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html
- http://www.openwall.com/lists/oss-security/2022/11/05/1
- https://gitlab.freedesktop.org/pixman/pixman/-/issues/63
- https://lists.debian.org/debian-lts-announce/2022/11/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
- https://www.debian.org/security/2022/dsa-5276
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2018-6954
- https://github.com/systemd/systemd/issues/7986
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://usn.ubuntu.com/3816-1/
- https://usn.ubuntu.com/3816-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-6954
- https://github.com/systemd/systemd/issues/7986
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://usn.ubuntu.com/3816-1/
- https://usn.ubuntu.com/3816-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.
Remediation
There is no fixed version for Centos:7 tar.
References
- http://marc.info/?l=bugtraq&m=112327628230258&w=2
- https://access.redhat.com/security/cve/CVE-2005-2541
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
medium severity
- Vulnerable module: zlib
- Introduced through: zlib@1.2.7-18.el7
- Fixed in: 0:1.2.7-21.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › zlib@1.2.7-18.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
Remediation
Upgrade Centos:7 zlib to version 0:1.2.7-21.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-37434
- https://access.redhat.com/errata/RHSA-2023:1095
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
- https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d
- http://seclists.org/fulldisclosure/2022/Oct/37
- http://seclists.org/fulldisclosure/2022/Oct/38
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/42
- http://www.openwall.com/lists/oss-security/2022/08/05/2
- http://www.openwall.com/lists/oss-security/2022/08/09/1
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- https://www.debian.org/security/2022/dsa-5218
- https://github.com/curl/curl/issues/9271
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.13
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.13 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-25220
- https://access.redhat.com/errata/RHSA-2023:0402
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://kb.isc.org/v1/docs/cve-2021-25220
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
- https://security.gentoo.org/glsa/202210-25
- https://security.netapp.com/advisory/ntap-20220408-0001/
- https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
medium severity
- Vulnerable module: dracut
- Introduced through: dracut@033-568.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dracut@033-568.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream dracut package and not the dracut package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.
Remediation
There is no fixed version for Centos:7 dracut.
References
- http://www.securityfocus.com/bid/94315
- https://access.redhat.com/security/cve/CVE-2016-4484
- http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html
- https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb
- http://www.openwall.com/lists/oss-security/2016/11/14/13
- http://www.openwall.com/lists/oss-security/2016/11/15/1
- http://www.openwall.com/lists/oss-security/2016/11/15/4
- http://www.openwall.com/lists/oss-security/2016/11/16/6
medium severity
new
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.
Remediation
There is no fixed version for Centos:7 libpng.
References
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://security.netapp.com/advisory/ntap-20190806-0002/
- https://support.f5.com/csp/article/K13322484
- https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2019-13115
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
- https://blog.semmle.com/libssh2-integer-overflow/
- https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
- https://github.com/libssh2/libssh2/pull/350
- https://libssh2.org/changes.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
- http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
- https://support.f5.com/csp/article/K13322484?utm_source=f5support&%3Butm_medium=RSS
medium severity
new
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://access.redhat.com/security/cve/CVE-2026-22185
- https://seclists.org/fulldisclosure/2026/Jan/5
- https://seclists.org/fulldisclosure/2026/Jan/8
- https://www.openldap.org/
- https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline
- https://bugs.openldap.org/show_bug.cgi?id=10421
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-13836
- https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b8676628
- https://github.com/python/cpython/commit/289f29b0fe38baf2d7cb5854f4bb573cc34a6a15
- https://github.com/python/cpython/commit/4ce27904b597c77d74dd93f2c912676021a99155
- https://github.com/python/cpython/commit/5a4c4a033a4a54481be6870aa1896fad732555b5
- https://github.com/python/cpython/issues/119451
- https://github.com/python/cpython/pull/119454
- https://mail.python.org/archives/list/security-announce@python.org/thread/OQ6G7MKRQIS3OAREC3HNG3D2DPOU34XO/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-6923
- https://github.com/python/cpython/issues/121650
- https://github.com/python/cpython/pull/122233
- https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
- https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
- https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
- https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
- https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
- https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
- https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
- http://www.openwall.com/lists/oss-security/2024/08/01/3
- http://www.openwall.com/lists/oss-security/2024/08/02/2
- https://security.netapp.com/advisory/ntap-20240926-0003/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
- https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Python standard library functions urllib.parse.urlsplit and urlparse accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-0938
- https://github.com/python/cpython/issues/105704
- https://github.com/python/cpython/pull/129418
- https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
- https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
- https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
- https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
- https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
- https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
- https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
- https://security.netapp.com/advisory/ntap-20250314-0002/
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-13836
- https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b8676628
- https://github.com/python/cpython/commit/289f29b0fe38baf2d7cb5854f4bb573cc34a6a15
- https://github.com/python/cpython/commit/4ce27904b597c77d74dd93f2c912676021a99155
- https://github.com/python/cpython/commit/5a4c4a033a4a54481be6870aa1896fad732555b5
- https://github.com/python/cpython/issues/119451
- https://github.com/python/cpython/pull/119454
- https://mail.python.org/archives/list/security-announce@python.org/thread/OQ6G7MKRQIS3OAREC3HNG3D2DPOU34XO/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-6923
- https://github.com/python/cpython/issues/121650
- https://github.com/python/cpython/pull/122233
- https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
- https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
- https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
- https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
- https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
- https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
- https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
- http://www.openwall.com/lists/oss-security/2024/08/01/3
- http://www.openwall.com/lists/oss-security/2024/08/02/2
- https://security.netapp.com/advisory/ntap-20240926-0003/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
- https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Python standard library functions urllib.parse.urlsplit and urlparse accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-0938
- https://github.com/python/cpython/issues/105704
- https://github.com/python/cpython/pull/129418
- https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
- https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
- https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
- https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
- https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
- https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
- https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
- https://security.netapp.com/advisory/ntap-20250314-0002/
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
medium severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
- Fixed in: 0:2.11-28.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
Remediation
Upgrade Centos:7 cpio to version 0:2.11-28.el7 or higher.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
- https://access.redhat.com/security/cve/CVE-2019-14866
- https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
- https://access.redhat.com/errata/RHSA-2020:3908
- https://bugzilla.redhat.com/show_bug.cgi?id=1765511
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/94347
- https://access.redhat.com/security/cve/CVE-2016-9318
- https://security.gentoo.org/glsa/201711-01
- https://bugzilla.gnome.org/show_bug.cgi?id=772726
- https://github.com/lsh123/xmlsec/issues/43
- https://usn.ubuntu.com/3739-1/
- https://usn.ubuntu.com/3739-2/
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/94347
- https://access.redhat.com/security/cve/CVE-2016-9318
- https://security.gentoo.org/glsa/201711-01
- https://bugzilla.gnome.org/show_bug.cgi?id=772726
- https://github.com/lsh123/xmlsec/issues/43
- https://usn.ubuntu.com/3739-1/
- https://usn.ubuntu.com/3739-2/
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-1292
- https://access.redhat.com/errata/RHSA-2022:5818
- https://access.redhat.com/errata/RHSA-2022:6224
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
- https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
- https://gitlab.com/fraf0/cve-2022-1292-re_score-analysis
- https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011
- https://security.gentoo.org/glsa/202210-02
- https://security.netapp.com/advisory/ntap-20220602-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://www.debian.org/security/2022/dsa-5139
- https://www.openssl.org/news/secadv/20220503.txt
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/alcaparra/CVE-2022-1292
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-2068
- https://access.redhat.com/errata/RHSA-2022:5818
- https://access.redhat.com/errata/RHSA-2022:6224
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
- https://gitlab.com/fraf0/cve-2022-1292-re_score-analysis
- http://seclists.org/fulldisclosure/2024/Nov/0
- https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
- https://security.netapp.com/advisory/ntap-20220707-0008/
- https://www.debian.org/security/2022/dsa-5169
- https://www.openssl.org/news/secadv/20220621.txt
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
- Fixed in: 0:4.11.3-48.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Remediation
Upgrade Centos:7 rpm to version 0:4.11.3-48.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-20271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1934125
- https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
- https://access.redhat.com/errata/RHSA-2021:4785
- https://access.redhat.com/errata/RHBA-2021:2854
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
- https://www.starwindsoftware.com/security/sw-20220805-0002/
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
- Fixed in: 0:4.11.3-48.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Remediation
Upgrade Centos:7 rpm-build-libs to version 0:4.11.3-48.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-20271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1934125
- https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
- https://access.redhat.com/errata/RHSA-2021:4785
- https://access.redhat.com/errata/RHBA-2021:2854
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
- https://www.starwindsoftware.com/security/sw-20220805-0002/
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
- Fixed in: 0:4.11.3-48.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Remediation
Upgrade Centos:7 rpm-libs to version 0:4.11.3-48.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-20271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1934125
- https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
- https://access.redhat.com/errata/RHSA-2021:4785
- https://access.redhat.com/errata/RHBA-2021:2854
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
- https://www.starwindsoftware.com/security/sw-20220805-0002/
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
- Fixed in: 0:4.11.3-48.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Remediation
Upgrade Centos:7 rpm-python to version 0:4.11.3-48.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2021-20271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1934125
- https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
- https://access.redhat.com/errata/RHSA-2021:4785
- https://access.redhat.com/errata/RHBA-2021:2854
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
- https://www.starwindsoftware.com/security/sw-20220805-0002/
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://security.netapp.com/advisory/ntap-20200611-0003/
- https://access.redhat.com/security/cve/CVE-2020-13776
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
- https://github.com/systemd/systemd/issues/15985
- https://access.redhat.com/errata/RHSA-2021:1611
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2017-18078
- https://www.exploit-db.com/exploits/43935/
- http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
- https://github.com/systemd/systemd/issues/7736
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://www.openwall.com/lists/oss-security/2018/01/29/4
- http://www.openwall.com/lists/oss-security/2018/01/29/3
- http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://security.netapp.com/advisory/ntap-20200611-0003/
- https://access.redhat.com/security/cve/CVE-2020-13776
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
- https://github.com/systemd/systemd/issues/15985
- https://access.redhat.com/errata/RHSA-2021:1611
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-18078
- https://www.exploit-db.com/exploits/43935/
- http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
- https://github.com/systemd/systemd/issues/7736
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://www.openwall.com/lists/oss-security/2018/01/29/4
- http://www.openwall.com/lists/oss-security/2018/01/29/3
- http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
- Fixed in: 0:2.56.1-7.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
Remediation
Upgrade Centos:7 glib2 to version 0:2.56.1-7.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20190606-0003/
- https://access.redhat.com/security/cve/CVE-2019-12450
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/
- https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174
- https://lists.debian.org/debian-lts-announce/2019/06/msg00013.html
- https://access.redhat.com/errata/RHSA-2020:3978
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html
- https://usn.ubuntu.com/4014-1/
- https://usn.ubuntu.com/4014-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-1355
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://bugzilla.redhat.com/show_bug.cgi?id=2074415
- https://gitlab.com/libtiff/libtiff/-/issues/400
- https://gitlab.com/libtiff/libtiff/-/merge_requests/323
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20221014-0007/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libwayland-client
- Introduced through: libwayland-client@1.15.0-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libwayland-client@1.15.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libwayland-client package and not the libwayland-client package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
Remediation
There is no fixed version for Centos:7 libwayland-client.
References
medium severity
- Vulnerable module: libwayland-server
- Introduced through: libwayland-server@1.15.0-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libwayland-server@1.15.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libwayland-server package and not the libwayland-server package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
Remediation
There is no fixed version for Centos:7 libwayland-server.
References
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- https://access.redhat.com/security/cve/CVE-2021-3872
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://access.redhat.com/errata/RHSA-2022:0366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
- https://security.gentoo.org/glsa/202208-32
medium severity
new
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
new
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Sending a flood of dynamic DNS updates may cause named to allocate large amounts of memory. This, in turn, may cause named to exit due to a lack of free memory. We are not aware of any cases where this has been exploited.
Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes.
If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only likely to be possible to degrade or stop named by sending a flood of unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same detrimental outcome.
BIND 9.11 and earlier branches are also affected, but through exhaustion of internal resources rather than memory constraints. This may reduce performance but should not be a significant problem for most servers. Therefore we don't intend to address this for BIND versions prior to BIND 9.16. This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.8-S1 through 9.16.36-S1.
Remediation
There is no fixed version for Centos:7 bind-license.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.7 or higher.
References
- https://kb.isc.org/v1/docs/cve-2021-25214
- https://security.netapp.com/advisory/ntap-20210521-0006/
- https://access.redhat.com/security/cve/CVE-2021-25214
- https://www.debian.org/security/2021/dsa-4909
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
- https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
- http://www.openwall.com/lists/oss-security/2021/04/29/1
- http://www.openwall.com/lists/oss-security/2021/04/29/2
- http://www.openwall.com/lists/oss-security/2021/04/29/3
- http://www.openwall.com/lists/oss-security/2021/04/29/4
- https://access.redhat.com/errata/RHSA-2021:3325
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.2 or higher.
References
- https://kb.isc.org/docs/cve-2020-8622
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://access.redhat.com/security/cve/CVE-2020-8622
- https://www.debian.org/security/2020/dsa-4752
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
- https://security.gentoo.org/glsa/202008-19
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
- https://access.redhat.com/errata/RHSA-2020:5011
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
- https://usn.ubuntu.com/4468-1/
- https://usn.ubuntu.com/4468-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2019-19221
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHFV25AVTASTWZRF3KTSL357AQ6TYHM4/
- https://github.com/libarchive/libarchive/commit/22b1db9d46654afc6f0c28f90af8cdc84a199f41
- https://github.com/libarchive/libarchive/issues/1276
- https://access.redhat.com/errata/RHSA-2020:4443
- https://usn.ubuntu.com/4293-1/
- https://lists.debian.org/debian-lts-announce/2022/04/msg00020.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RHFV25AVTASTWZRF3KTSL357AQ6TYHM4/
medium severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
Remediation
There is no fixed version for Centos:7 cairo.
References
- https://access.redhat.com/security/cve/CVE-2019-6462
- https://github.com/TeamSeri0us/pocs/tree/master/gerbv
- https://gitlab.freedesktop.org/cairo/cairo/issues/353
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
medium severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.
Remediation
There is no fixed version for Centos:7 cairo.
References
- https://access.redhat.com/security/cve/CVE-2019-6461
- https://github.com/TeamSeri0us/pocs/tree/master/gerbv
- https://gitlab.freedesktop.org/cairo/cairo/issues/352
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-58364
- https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
- https://lists.debian.org/debian-lts-announce/2025/09/msg00013.html
- http://www.openwall.com/lists/oss-security/2025/09/11/2
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://security.netapp.com/advisory/ntap-20210122-0007/
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://access.redhat.com/security/cve/CVE-2020-8285
- https://www.debian.org/security/2021/dsa-4881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- http://seclists.org/fulldisclosure/2021/Apr/51
- https://security.gentoo.org/glsa/202012-14
- https://curl.se/docs/CVE-2020-8285.html
- https://github.com/curl/curl/issues/6255
- https://hackerone.com/reports/1045844
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
Remediation
There is no fixed version for Centos:7 dbus.
References
- https://access.redhat.com/security/cve/CVE-2022-42010
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
Remediation
There is no fixed version for Centos:7 dbus.
References
- https://access.redhat.com/security/cve/CVE-2022-42012
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
Remediation
There is no fixed version for Centos:7 dbus.
References
- https://access.redhat.com/security/cve/CVE-2022-42011
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-42010
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-42011
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-42012
- https://access.redhat.com/errata/RHSA-2023:0096
- https://access.redhat.com/errata/RHSA-2023:0335
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
- https://security.gentoo.org/glsa/202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2022-23990
- https://access.redhat.com/errata/RHSA-2022:7811
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/551
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
- https://security.gentoo.org/glsa/202209-24
- https://www.debian.org/security/2022/dsa-5073
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.tenable.com/security/tns-2022-05
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2022-25313
- https://access.redhat.com/errata/RHSA-2022:5244
- https://access.redhat.com/errata/RHSA-2022:5314
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- http://www.openwall.com/lists/oss-security/2022/02/19/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://github.com/libexpat/libexpat/pull/558
- https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
- https://security.gentoo.org/glsa/202209-24
- https://security.netapp.com/advisory/ntap-20220303-0008/
- https://www.debian.org/security/2022/dsa-5085
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- https://bugzilla.gnome.org/show_bug.cgi?id=769170
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=88af50a864195da1a4f7bda5f02539704fbda599
- https://git.gnome.org/browse/gdk-pixbuf/tree/NEWS?id=640134c46221689d263369872937192e4484c83b
- https://access.redhat.com/security/cve/CVE-2016-6352
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- http://www.openwall.com/lists/oss-security/2016/07/13/11
- http://www.openwall.com/lists/oss-security/2016/07/26/11
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00040.html
- http://www.ubuntu.com/usn/USN-3085-1
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
Remediation
There is no fixed version for Centos:7 glib2.
References
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/107160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10278
- https://security.netapp.com/advisory/ntap-20190315-0002/
- https://support.f5.com/csp/article/K54823184
- https://access.redhat.com/security/cve/CVE-2019-9169
- https://security.gentoo.org/glsa/202006-04
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
- https://sourceware.org/bugzilla/show_bug.cgi?id=24114
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
- https://access.redhat.com/errata/RHSA-2021:1585
- https://usn.ubuntu.com/4416-1/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/107160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10278
- https://security.netapp.com/advisory/ntap-20190315-0002/
- https://support.f5.com/csp/article/K54823184
- https://access.redhat.com/security/cve/CVE-2019-9169
- https://security.gentoo.org/glsa/202006-04
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
- https://sourceware.org/bugzilla/show_bug.cgi?id=24114
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
- https://access.redhat.com/errata/RHSA-2021:1585
- https://usn.ubuntu.com/4416-1/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
- https://support.f5.com/csp/article/K08654551
- https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2019-13050
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
- https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
- https://twitter.com/lambdafu/status/1147162583969009664
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:4490
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
- https://support.f5.com/csp/article/K08654551?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: iputils
- Introduced through: iputils@20160308-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › iputils@20160308-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream iputils package and not the iputils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ping in iputils before 20250602 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.
Remediation
There is no fixed version for Centos:7 iputils.
References
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_abstorelstepsize in libjasper/jpc/jpc_enc.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-9252
- https://github.com/mdadams/jasper/issues/173
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
- Fixed in: 0:1.15.1-51.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
Remediation
Upgrade Centos:7 krb5-libs to version 0:1.15.1-51.el7_9 or higher.
References
- https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
- https://security.netapp.com/advisory/ntap-20210923-0002/
- https://access.redhat.com/security/cve/CVE-2021-37750
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
- https://github.com/krb5/krb5/releases
- https://web.mit.edu/kerberos/advisories/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
- https://access.redhat.com/errata/RHSA-2021:4788
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.starwindsoftware.com/security/sw-20220817-0004/
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2019-19221
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHFV25AVTASTWZRF3KTSL357AQ6TYHM4/
- https://github.com/libarchive/libarchive/commit/22b1db9d46654afc6f0c28f90af8cdc84a199f41
- https://github.com/libarchive/libarchive/issues/1276
- https://access.redhat.com/errata/RHSA-2020:4443
- https://usn.ubuntu.com/4293-1/
- https://lists.debian.org/debian-lts-announce/2022/04/msg00020.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RHFV25AVTASTWZRF3KTSL357AQ6TYHM4/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://security.netapp.com/advisory/ntap-20210122-0007/
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://access.redhat.com/security/cve/CVE-2020-8285
- https://www.debian.org/security/2021/dsa-4881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- http://seclists.org/fulldisclosure/2021/Apr/51
- https://security.gentoo.org/glsa/202012-14
- https://curl.se/docs/CVE-2020-8285.html
- https://github.com/curl/curl/issues/6255
- https://hackerone.com/reports/1045844
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://github.com/golang/go/issues/34540
- https://security.netapp.com/advisory/ntap-20191122-0004/
- https://access.redhat.com/security/cve/CVE-2019-16276
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
- https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:0101
- https://access.redhat.com/errata/RHSA-2020:0329
- https://access.redhat.com/errata/RHSA-2020:0652
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
- https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.
Remediation
There is no fixed version for Centos:7 libssh2.
References
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
- Fixed in: 0:1.8.0-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Remediation
Upgrade Centos:7 libssh2 to version 0:1.8.0-4.el7 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-17498
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
- https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
- https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
- https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
- https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
- https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
- https://access.redhat.com/errata/RHSA-2020:3915
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
- http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
- https://security.netapp.com/advisory/ntap-20220909-0004/
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://github.com/golang/go/issues/34540
- https://security.netapp.com/advisory/ntap-20191122-0004/
- https://access.redhat.com/security/cve/CVE-2019-16276
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
- https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:0101
- https://access.redhat.com/errata/RHSA-2020:0329
- https://access.redhat.com/errata/RHSA-2020:0652
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
- https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://bugzilla.redhat.com/show_bug.cgi?id=2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2519
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://bugzilla.redhat.com/show_bug.cgi?id=2122789
- https://gitlab.com/libtiff/libtiff/-/issues/423
- https://gitlab.com/libtiff/libtiff/-/merge_requests/378
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://seclists.org/bugtraq/2019/Nov/5
- https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
- https://access.redhat.com/security/cve/CVE-2019-6128
- https://security.gentoo.org/glsa/202003-25
- http://bugzilla.maptools.org/show_bug.cgi?id=2836
- http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html
- https://usn.ubuntu.com/3906-1/
- https://usn.ubuntu.com/3906-2/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/91741
- http://libtiff.maptools.org/v4.0.7.html
- https://access.redhat.com/security/cve/CVE-2016-6223
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/07/13/3
- http://www.openwall.com/lists/oss-security/2016/07/14/4
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3597
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/413
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3599
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/398
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3598
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/issues/435
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230110-0001/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3626
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/426
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230110-0001/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3627
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/411
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-6277
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://bugzilla.redhat.com/show_bug.cgi?id=2251311
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
- https://security.netapp.com/advisory/ntap-20240119-0002/
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://access.redhat.com/security/cve/CVE-2020-24977
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
- https://security.gentoo.org/glsa/202107-05
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2021:1597
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98601
- https://access.redhat.com/security/cve/CVE-2017-9049
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98568
- https://access.redhat.com/security/cve/CVE-2017-9050
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98877
- https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
- https://bugzilla.redhat.com/show_bug.cgi?id=1462203
- https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
- https://source.android.com/security/bulletin/2017-06-01
- https://access.redhat.com/security/cve/CVE-2017-7375
- https://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.securitytracker.com/id/1038623
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://access.redhat.com/security/cve/CVE-2020-24977
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
- https://security.gentoo.org/glsa/202107-05
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
- https://access.redhat.com/errata/RHSA-2021:1597
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98568
- https://access.redhat.com/security/cve/CVE-2017-9050
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98601
- https://access.redhat.com/security/cve/CVE-2017-9049
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98877
- https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
- https://bugzilla.redhat.com/show_bug.cgi?id=1462203
- https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
- https://source.android.com/security/bulletin/2017-06-01
- https://access.redhat.com/security/cve/CVE-2017-7375
- https://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.securitytracker.com/id/1038623
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
- http://www.securityfocus.com/bid/93054
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- https://support.apple.com/HT207143
- https://support.apple.com/HT207170
- https://access.redhat.com/security/cve/CVE-2016-4738
- http://www.debian.org/security/2016/dsa-3709
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- http://www.securitytracker.com/id/1036858
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may disclose sensitive information.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- https://access.redhat.com/security/cve/CVE-2023-40403
- https://lists.debian.org/debian-lts-announce/2025/09/msg00024.html
- http://seclists.org/fulldisclosure/2023/Oct/10
- http://seclists.org/fulldisclosure/2023/Oct/3
- http://seclists.org/fulldisclosure/2023/Oct/4
- http://seclists.org/fulldisclosure/2023/Oct/5
- http://seclists.org/fulldisclosure/2023/Oct/6
- http://seclists.org/fulldisclosure/2023/Oct/8
- http://seclists.org/fulldisclosure/2023/Oct/9
- https://support.apple.com/en-us/HT213927
- https://support.apple.com/en-us/HT213931
- https://support.apple.com/en-us/HT213932
- https://support.apple.com/en-us/HT213936
- https://support.apple.com/en-us/HT213937
- https://support.apple.com/en-us/HT213938
- https://support.apple.com/en-us/HT213940
- https://support.apple.com/kb/HT213931
- https://support.apple.com/kb/HT213932
- https://support.apple.com/kb/HT213936
- https://support.apple.com/kb/HT213937
- https://support.apple.com/kb/HT213938
- https://support.apple.com/kb/HT213940
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party
Remediation
There is no fixed version for Centos:7 ncurses.
References
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.
Remediation
There is no fixed version for Centos:7 nss.
References
- https://access.redhat.com/security/cve/CVE-2023-5388
- https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
- https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-12/
- https://www.mozilla.org/security/advisories/mfsa2024-13/
- https://www.mozilla.org/security/advisories/mfsa2024-14/
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
Remediation
There is no fixed version for Centos:7 nss.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://access.redhat.com/security/cve/CVE-2018-18508
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2019:1951
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- https://access.redhat.com/security/cve/CVE-2023-5388
- https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
- https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-12/
- https://www.mozilla.org/security/advisories/mfsa2024-13/
- https://www.mozilla.org/security/advisories/mfsa2024-14/
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://access.redhat.com/security/cve/CVE-2018-18508
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2019:1951
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- https://access.redhat.com/security/cve/CVE-2023-5388
- https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
- https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-12/
- https://www.mozilla.org/security/advisories/mfsa2024-13/
- https://www.mozilla.org/security/advisories/mfsa2024-14/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://access.redhat.com/security/cve/CVE-2018-18508
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://access.redhat.com/errata/RHSA-2019:1951
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://seclists.org/bugtraq/2019/Dec/23
- https://security.netapp.com/advisory/ntap-20190822-0004/
- https://support.apple.com/kb/HT210788
- https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
- https://access.redhat.com/security/cve/CVE-2019-13057
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://www.openldap.org/its/?findid=9038
- https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
- https://usn.ubuntu.com/4078-1/
- https://usn.ubuntu.com/4078-2/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
Remediation
There is no fixed version for Centos:7 openldap.
References
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.
Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.
An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.
When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*).
With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.
Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.
Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low.
In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.
The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.
In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-2650
- http://www.openwall.com/lists/oss-security/2023/05/30/1
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230703-0001/
- https://security.netapp.com/advisory/ntap-20231027-0009/
- https://www.debian.org/security/2023/dsa-5417
- https://www.openssl.org/news/secadv/20230530.txt
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
Remediation
There is no fixed version for Centos:7 python.
References
- https://security.netapp.com/advisory/ntap-20191107-0004/
- https://access.redhat.com/security/cve/CVE-2019-18348
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
- https://bugs.python.org/issue30458#msg347282
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
- https://usn.ubuntu.com/4333-1/
- https://usn.ubuntu.com/4333-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-92.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0001/
- https://access.redhat.com/security/cve/CVE-2020-26116
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
- https://security.gentoo.org/glsa/202101-18
- https://bugs.python.org/issue39603
- https://python-security.readthedocs.io/vuln/http-header-injection-method.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- https://access.redhat.com/errata/RHSA-2022:5235
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
- https://usn.ubuntu.com/4581-1/
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-92.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-26137
- https://bugs.python.org/issue39603
- https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
- https://github.com/urllib3/urllib3/pull/1800
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
- https://access.redhat.com/errata/RHSA-2022:5235
- https://usn.ubuntu.com/4570-1/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2021-3733
- https://access.redhat.com/errata/RHSA-2021:4057
- https://access.redhat.com/errata/RHSA-2021:4160
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://bugs.python.org/issue43075
- https://bugzilla.redhat.com/show_bug.cgi?id=1995234
- https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
- https://github.com/python/cpython/pull/24391
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://security.netapp.com/advisory/ntap-20220407-0001/
- https://ubuntu.com/security/CVE-2021-3733
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
Remediation
There is no fixed version for Centos:7 python.
References
- https://security.netapp.com/advisory/ntap-20200221-0001/
- https://access.redhat.com/security/cve/CVE-2020-8492
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
- https://security.gentoo.org/glsa/202005-09
- https://bugs.python.org/issue39503
- https://github.com/python/cpython/pull/18284
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://access.redhat.com/errata/RHSA-2020:3888
- https://access.redhat.com/errata/RHSA-2020:4433
- https://access.redhat.com/errata/RHSA-2020:4641
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
- https://usn.ubuntu.com/4333-1/
- https://usn.ubuntu.com/4333-2/
- https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://security.netapp.com/advisory/ntap-20191107-0004/
- https://access.redhat.com/security/cve/CVE-2019-18348
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
- https://bugs.python.org/issue30458#msg347282
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
- https://usn.ubuntu.com/4333-1/
- https://usn.ubuntu.com/4333-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-92.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0001/
- https://access.redhat.com/security/cve/CVE-2020-26116
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
- https://security.gentoo.org/glsa/202101-18
- https://bugs.python.org/issue39603
- https://python-security.readthedocs.io/vuln/http-header-injection-method.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- https://access.redhat.com/errata/RHSA-2022:5235
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
- https://usn.ubuntu.com/4581-1/
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-92.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-26137
- https://bugs.python.org/issue39603
- https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
- https://github.com/urllib3/urllib3/pull/1800
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
- https://access.redhat.com/errata/RHSA-2022:5235
- https://usn.ubuntu.com/4570-1/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3733
- https://access.redhat.com/errata/RHSA-2021:4057
- https://access.redhat.com/errata/RHSA-2021:4160
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://bugs.python.org/issue43075
- https://bugzilla.redhat.com/show_bug.cgi?id=1995234
- https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
- https://github.com/python/cpython/pull/24391
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://security.netapp.com/advisory/ntap-20220407-0001/
- https://ubuntu.com/security/CVE-2021-3733
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://security.netapp.com/advisory/ntap-20200221-0001/
- https://access.redhat.com/security/cve/CVE-2020-8492
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
- https://security.gentoo.org/glsa/202005-09
- https://bugs.python.org/issue39503
- https://github.com/python/cpython/pull/18284
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://access.redhat.com/errata/RHSA-2020:3888
- https://access.redhat.com/errata/RHSA-2020:4433
- https://access.redhat.com/errata/RHSA-2020:4641
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
- https://usn.ubuntu.com/4333-1/
- https://usn.ubuntu.com/4333-2/
- https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2021-35939
- https://bugzilla.redhat.com/show_bug.cgi?id=1964129
- https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2021-35938
- https://bugzilla.redhat.com/show_bug.cgi?id=1964114
- https://bugzilla.suse.com/show_bug.cgi?id=1157880
- https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-35938
- https://bugzilla.redhat.com/show_bug.cgi?id=1964114
- https://bugzilla.suse.com/show_bug.cgi?id=1157880
- https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-35939
- https://bugzilla.redhat.com/show_bug.cgi?id=1964129
- https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-35939
- https://bugzilla.redhat.com/show_bug.cgi?id=1964129
- https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-35938
- https://bugzilla.redhat.com/show_bug.cgi?id=1964114
- https://bugzilla.suse.com/show_bug.cgi?id=1157880
- https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2021-35939
- https://bugzilla.redhat.com/show_bug.cgi?id=1964129
- https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2021-35938
- https://bugzilla.redhat.com/show_bug.cgi?id=1964114
- https://bugzilla.suse.com/show_bug.cgi?id=1157880
- https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
- https://github.com/rpm-software-management/rpm/pull/1919
- https://rpm.org/wiki/Releases/4.18.0
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- http://www.securityfocus.com/bid/98767
- http://www.securityfocus.com/bid/99950
- https://support.apple.com/HT207797
- https://support.apple.com/HT207798
- https://access.redhat.com/security/cve/CVE-2017-7000
- https://www.debian.org/security/2017/dsa-3926
- https://security.gentoo.org/glsa/201709-15
- https://access.redhat.com/errata/RHSA-2017:1833
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://seclists.org/bugtraq/2020/Jan/27
- https://access.redhat.com/security/cve/CVE-2019-13752
- https://www.debian.org/security/2020/dsa-4606
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://security.gentoo.org/glsa/202003-08
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1025470
- https://access.redhat.com/errata/RHSA-2019:4238
- https://access.redhat.com/errata/RHSA-2020:1810
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://usn.ubuntu.com/4298-1/
- https://usn.ubuntu.com/4298-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://seclists.org/bugtraq/2020/Jan/27
- https://access.redhat.com/security/cve/CVE-2019-13753
- https://www.debian.org/security/2020/dsa-4606
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://security.gentoo.org/glsa/202003-08
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1025471
- https://access.redhat.com/errata/RHSA-2019:4238
- https://access.redhat.com/errata/RHSA-2020:1810
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://usn.ubuntu.com/4298-1/
- https://usn.ubuntu.com/4298-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://seclists.org/bugtraq/2020/Jan/27
- https://access.redhat.com/security/cve/CVE-2019-13751
- https://www.debian.org/security/2020/dsa-4606
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://security.gentoo.org/glsa/202003-08
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1025465
- https://access.redhat.com/errata/RHSA-2019:4238
- https://access.redhat.com/errata/RHSA-2021:4396
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://usn.ubuntu.com/4298-1/
- https://usn.ubuntu.com/4298-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
medium severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
Remediation
There is no fixed version for Centos:7 libblkid.
References
medium severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-17.el7
- Fixed in: 0:1.42.9-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcom_err@1.42.9-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
Remediation
Upgrade Centos:7 libcom_err to version 0:1.42.9-19.el7 or higher.
References
- https://seclists.org/bugtraq/2019/Sep/58
- https://security.netapp.com/advisory/ntap-20200115-0002/
- https://access.redhat.com/security/cve/CVE-2019-5094
- https://www.debian.org/security/2019/dsa-4535
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
- https://security.gentoo.org/glsa/202003-05
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
- https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4011
- https://usn.ubuntu.com/4142-1/
- https://usn.ubuntu.com/4142-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
medium severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
Remediation
There is no fixed version for Centos:7 libmount.
References
medium severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
Remediation
There is no fixed version for Centos:7 libuuid.
References
medium severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
Remediation
There is no fixed version for Centos:7 util-linux.
References
medium severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).
Remediation
There is no fixed version for Centos:7 cairo.
References
- https://access.redhat.com/security/cve/CVE-2018-18064
- https://gitlab.freedesktop.org/cairo/cairo/issues/341
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
Remediation
Upgrade Centos:7 curl to version 0:7.29.0-59.el7 or higher.
References
- https://seclists.org/bugtraq/2020/Feb/36
- https://curl.haxx.se/docs/CVE-2019-5482.html
- https://security.netapp.com/advisory/ntap-20191004-0003/
- https://security.netapp.com/advisory/ntap-20200416-0003/
- https://access.redhat.com/security/cve/CVE-2019-5482
- https://www.debian.org/security/2020/dsa-4633
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
- https://security.gentoo.org/glsa/202003-29
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:3916
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
Remediation
Upgrade Centos:7 libcurl to version 0:7.29.0-59.el7 or higher.
References
- https://seclists.org/bugtraq/2020/Feb/36
- https://curl.haxx.se/docs/CVE-2019-5482.html
- https://security.netapp.com/advisory/ntap-20191004-0003/
- https://security.netapp.com/advisory/ntap-20200416-0003/
- https://access.redhat.com/security/cve/CVE-2019-5482
- https://www.debian.org/security/2020/dsa-4633
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
- https://security.gentoo.org/glsa/202003-29
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:3916
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
- Fixed in: 0:1.1.28-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
Remediation
Upgrade Centos:7 libxslt to version 0:1.1.28-6.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/security/cve/CVE-2019-11068
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html
- http://www.openwall.com/lists/oss-security/2019/04/22/1
- http://www.openwall.com/lists/oss-security/2019/04/23/5
- https://access.redhat.com/errata/RHSA-2020:4005
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html
- https://usn.ubuntu.com/3947-1/
- https://usn.ubuntu.com/3947-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime (NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long string to a PR_*printf function.
Remediation
There is no fixed version for Centos:7 nspr.
References
- http://www.securityfocus.com/bid/92385
- https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
- https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2
- https://access.redhat.com/security/cve/CVE-2016-1951
- https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ
- http://www.securitytracker.com/id/1036590
- http://www.ubuntu.com/usn/USN-3023-1
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been found in the CPython venv module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-9287
- https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
- https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
- https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
- https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
- https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
- https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
- https://github.com/python/cpython/issues/124651
- https://github.com/python/cpython/pull/124712
- https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
- https://security.netapp.com/advisory/ntap-20250425-0006/
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been found in the CPython venv module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-9287
- https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
- https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
- https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
- https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
- https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
- https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
- https://github.com/python/cpython/issues/124651
- https://github.com/python/cpython/pull/124712
- https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
- https://security.netapp.com/advisory/ntap-20250425-0006/
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm.
References
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2023-26604
- https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
- http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
- https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
- https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340
- https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html
- https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
- https://security.netapp.com/advisory/ntap-20230505-0009/
- https://www.exploit-db.com/exploits/51674
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-26604
- https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
- http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
- https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
- https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340
- https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html
- https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
- https://security.netapp.com/advisory/ntap-20230505-0009/
- https://www.exploit-db.com/exploits/51674
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
Remediation
There is no fixed version for Centos:7 dbus.
References
- https://access.redhat.com/security/cve/CVE-2023-34969
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://security.netapp.com/advisory/ntap-20231208-0007/
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-34969
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://security.netapp.com/advisory/ntap-20231208-0007/
medium severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
medium severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
medium severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
Remediation
There is no fixed version for Centos:7 expat.
References
medium severity
- Vulnerable module: gmp
- Introduced through: gmp@1:6.0.0-15.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gmp@1:6.0.0-15.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gmp package and not the gmp package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
Remediation
There is no fixed version for Centos:7 gmp.
References
- https://access.redhat.com/security/cve/CVE-2021-43618
- https://bugs.debian.org/994405
- https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
- https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
- http://seclists.org/fulldisclosure/2022/Oct/8
- http://www.openwall.com/lists/oss-security/2022/10/13/3
- https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
- https://security.gentoo.org/glsa/202309-13
- https://security.netapp.com/advisory/ntap-20221111-0001/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0865
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
- https://gitlab.com/libtiff/libtiff/-/issues/385
- https://gitlab.com/libtiff/libtiff/-/merge_requests/306
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://www.debian.org/security/2022/dsa-5108
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval, xmlXPathCtxtCompile, and xmlXPathEvalExpr were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval, xmlXPathCtxtCompile, and xmlXPathEvalExpr were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was found in the CPython zipfile module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-0450
- https://security.netapp.com/advisory/ntap-20250411-0005/
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
- https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
- https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
- https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
- https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
- https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
- https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
- https://github.com/python/cpython/issues/109858
- https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
- https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
- https://www.bamsoftware.com/hacks/zipbomb/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was found in the CPython zipfile module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-0450
- https://security.netapp.com/advisory/ntap-20250411-0005/
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
- https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
- https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
- https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
- https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
- https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
- https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
- https://github.com/python/cpython/issues/109858
- https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
- https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
- https://www.bamsoftware.com/hacks/zipbomb/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability found in SQLite3 v.3.27.1 and before allows a local attacker to cause a denial of service via a crafted script.
Remediation
There is no fixed version for Centos:7 sqlite.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got before the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2021-22947
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
- https://hackerone.com/reports/1334763
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:4059
- http://seclists.org/fulldisclosure/2022/Mar/29
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20211029-0003/
- https://support.apple.com/kb/HT213183
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
- Fixed in: 0:2.56.1-7.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
Remediation
Upgrade Centos:7 glib2 to version 0:2.56.1-7.el7 or higher.
References
medium severity
new
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk.
References
medium severity
new
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-devel.
References
medium severity
new
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-headless.
References
medium severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Remediation
There is no fixed version for Centos:7 libblkid.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got before the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2021-22947
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
- https://hackerone.com/reports/1334763
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:4059
- http://seclists.org/fulldisclosure/2022/Mar/29
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20211029-0003/
- https://support.apple.com/kb/HT213183
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://security.netapp.com/advisory/ntap-20200924-0003/
- https://access.redhat.com/security/cve/CVE-2020-24553
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
- http://seclists.org/fulldisclosure/2020/Sep/5
- http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
- https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2020:5493
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
- https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- http://www.securityfocus.com/bid/99338
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
- https://access.redhat.com/security/cve/CVE-2017-7526
- https://www.debian.org/security/2017/dsa-3901
- https://www.debian.org/security/2017/dsa-3960
- https://eprint.iacr.org/2017/627
- https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
- http://www.securitytracker.com/id/1038915
- https://usn.ubuntu.com/3733-1/
- https://usn.ubuntu.com/3733-2/
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9
medium severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Remediation
There is no fixed version for Centos:7 libmount.
References
medium severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
Remediation
There is no fixed version for Centos:7 libpng.
References
medium severity
new
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
Remediation
There is no fixed version for Centos:7 libpng.
References
- https://access.redhat.com/security/cve/CVE-2026-22695
- https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea
- https://github.com/pnggroup/libpng/commit/e4f7ad4ea2
- https://github.com/pnggroup/libpng/issues/778
- https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://security.netapp.com/advisory/ntap-20200924-0003/
- https://access.redhat.com/security/cve/CVE-2020-24553
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
- http://seclists.org/fulldisclosure/2020/Sep/5
- http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
- https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2020:5493
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
- https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0924
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
- https://gitlab.com/libtiff/libtiff/-/issues/278
- https://gitlab.com/libtiff/libtiff/-/merge_requests/311
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://www.debian.org/security/2022/dsa-5108
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0796
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0798
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0797
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0795
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0803
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0804
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0801
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0800
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0802
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Remediation
There is no fixed version for Centos:7 libuuid.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Possible cross-site scripting vulnerability in libxml after commit 960f0e2.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Possible cross-site scripting vulnerability in libxml after commit 960f0e2.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A mismatch between allocator and deallocator could have led to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
Remediation
There is no fixed version for Centos:7 nss.
References
- https://access.redhat.com/security/cve/CVE-2024-6602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
- https://lists.debian.org/debian-lts-announce/2024/10/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-30/
- https://www.mozilla.org/security/advisories/mfsa2024-31/
- https://www.mozilla.org/security/advisories/mfsa2024-32/
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates where it can yield a result "POINT_AT_INFINITY" when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret. This vulnerability affects Firefox < 55.
Remediation
There is no fixed version for Centos:7 nss-softokn.
References
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates where it can yield a result "POINT_AT_INFINITY" when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret. This vulnerability affects Firefox < 55.
Remediation
There is no fixed version for Centos:7 nss-softokn-freebl.
References
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A mismatch between allocator and deallocator could have led to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- https://access.redhat.com/security/cve/CVE-2024-6602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
- https://lists.debian.org/debian-lts-announce/2024/10/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-30/
- https://www.mozilla.org/security/advisories/mfsa2024-31/
- https://www.mozilla.org/security/advisories/mfsa2024-32/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A mismatch between allocator and deallocator could have led to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- https://access.redhat.com/security/cve/CVE-2024-6602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
- https://lists.debian.org/debian-lts-announce/2024/10/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-30/
- https://www.mozilla.org/security/advisories/mfsa2024-31/
- https://www.mozilla.org/security/advisories/mfsa2024-32/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-89.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-89.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20191017-0004/
- https://access.redhat.com/security/cve/CVE-2019-16935
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
- https://bugs.python.org/issue38243
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/pull/16373
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:3911
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://usn.ubuntu.com/4151-1/
- https://usn.ubuntu.com/4151-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-89.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-89.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20191017-0004/
- https://access.redhat.com/security/cve/CVE-2019-16935
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
- https://bugs.python.org/issue38243
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/pull/16373
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:3911
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://usn.ubuntu.com/4151-1/
- https://usn.ubuntu.com/4151-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
medium severity
- Vulnerable module: python-lxml
- Introduced through: python-lxml@3.2.1-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-lxml@3.2.1-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-lxml package and not the python-lxml package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
Remediation
There is no fixed version for Centos:7 python-lxml.
References
- https://security.netapp.com/advisory/ntap-20210521-0003/
- https://access.redhat.com/security/cve/CVE-2020-27783
- https://www.debian.org/security/2020/dsa-4810
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/
- https://advisory.checkmarx.net/advisory/CX-2020-4286
- https://bugzilla.redhat.com/show_bug.cgi?id=1901633
- https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html
- https://access.redhat.com/errata/RHSA-2021:1761
- https://access.redhat.com/errata/RHSA-2021:1879
- https://access.redhat.com/errata/RHSA-2021:1898
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: python-lxml
- Introduced through: python-lxml@3.2.1-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-lxml@3.2.1-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-lxml package and not the python-lxml package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
Remediation
There is no fixed version for Centos:7 python-lxml.
References
- https://security.netapp.com/advisory/ntap-20210521-0004/
- https://access.redhat.com/security/cve/CVE-2021-28957
- https://www.debian.org/security/2021/dsa-4880
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/
- https://bugs.launchpad.net/lxml/+bug/1888153
- https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999
- https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html
- https://access.redhat.com/errata/RHSA-2021:4151
- https://access.redhat.com/errata/RHSA-2021:4158
- https://access.redhat.com/errata/RHSA-2021:4160
- https://access.redhat.com/errata/RHSA-2021:4162
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/
- https://security.gentoo.org/glsa/202208-06
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://security.netapp.com/advisory/ntap-20210625-0005/
- https://access.redhat.com/security/cve/CVE-2020-13529
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
- https://security.gentoo.org/glsa/202107-48
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
- http://www.openwall.com/lists/oss-security/2021/08/04/2
- http://www.openwall.com/lists/oss-security/2021/08/17/3
- http://www.openwall.com/lists/oss-security/2021/09/07/3
- https://access.redhat.com/errata/RHSA-2021:4361
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://security.netapp.com/advisory/ntap-20210625-0005/
- https://access.redhat.com/security/cve/CVE-2020-13529
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
- https://security.gentoo.org/glsa/202107-48
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
- http://www.openwall.com/lists/oss-security/2021/08/04/2
- http://www.openwall.com/lists/oss-security/2021/08/17/3
- http://www.openwall.com/lists/oss-security/2021/09/07/3
- https://access.redhat.com/errata/RHSA-2021:4361
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
medium severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Remediation
There is no fixed version for Centos:7 util-linux.
References
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-61915
- https://github.com/OpenPrinting/cups/commit/db8d560262c22a21ee1e55dfd62fa98d9359bcb0
- https://github.com/OpenPrinting/cups/releases/tag/v2.4.15
- http://www.openwall.com/lists/oss-security/2025/11/27/5
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-hxm8-vfpq-jrfc
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function format_log_line could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file cupsd.conf sets the value of loglevel to DEBUG. No known patches or workarounds exist at time of publication.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-27535
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1892780
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-27536
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1895135
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with xn-- and should not be allowed to pattern match, but the wildcard check in curl could still check for x*, which would match even though the IDN name most likely contained nothing even resembling an x.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-28321
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- http://seclists.org/fulldisclosure/2023/Jul/47
- http://seclists.org/fulldisclosure/2023/Jul/48
- http://seclists.org/fulldisclosure/2023/Jul/52
- https://hackerone.com/reports/1950627
- https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.
Remediation
There is no fixed version for Centos:7 expat.
References
medium severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://www.securityfocus.com/bid/97405
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
- https://source.android.com/security/bulletin/2017-04-01
- https://access.redhat.com/security/cve/CVE-2016-10244
- http://www.debian.org/security/2017/dsa-3839
- https://security.gentoo.org/glsa/201706-14
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://www.securitytracker.com/id/1038090
- http://www.securitytracker.com/id/1038201
medium severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C.
This issue affects giflib: through 5.2.2.
Remediation
There is no fixed version for Centos:7 giflib.
References
- https://access.redhat.com/security/cve/CVE-2025-31344
- https://gitee.com/src-openeuler/giflib/pulls/54
- https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292
- http://www.openwall.com/lists/oss-security/2025/04/07/3
- http://www.openwall.com/lists/oss-security/2025/04/07/4
- http://www.openwall.com/lists/oss-security/2025/04/07/5
- http://www.openwall.com/lists/oss-security/2025/04/07/6
- http://www.openwall.com/lists/oss-security/2025/04/08/1
- http://www.openwall.com/lists/oss-security/2025/04/09/5
- http://www.openwall.com/lists/oss-security/2025/04/09/7
- http://www.openwall.com/lists/oss-security/2025/04/10/1
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/102073
- https://source.android.com/security/bulletin/2017-12-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=20112
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- https://access.redhat.com/security/cve/CVE-2016-4429
- https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
- https://usn.ubuntu.com/3759-1/
- https://usn.ubuntu.com/3759-2/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2023-4806
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
- https://security.gentoo.org/glsa/202310-03
- https://security.netapp.com/advisory/ntap-20240125-0008/
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://bugzilla.redhat.com/show_bug.cgi?id=2237782
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2023-4813
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.netapp.com/advisory/ntap-20231110-0003/
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/102073
- https://source.android.com/security/bulletin/2017-12-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=20112
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- https://access.redhat.com/security/cve/CVE-2016-4429
- https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
- https://usn.ubuntu.com/3759-1/
- https://usn.ubuntu.com/3759-2/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2023-4806
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
- https://security.gentoo.org/glsa/202310-03
- https://security.netapp.com/advisory/ntap-20240125-0008/
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://bugzilla.redhat.com/show_bug.cgi?id=2237782
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2023-4813
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.netapp.com/advisory/ntap-20231110-0003/
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798
medium severity
new
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
medium severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://access.redhat.com/security/cve/CVE-2022-34903
- https://access.redhat.com/errata/RHSA-2022:6463
- https://access.redhat.com/errata/RHSA-2022:6602
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPTAR76EIZY7NQFENSOZO7U473257OVZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VN63GBTMRWO36Y7BKA2WQHROAKCXKCBL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/
- http://www.openwall.com/lists/oss-security/2022/07/02/1
- https://bugs.debian.org/1014157
- https://dev.gnupg.org/T6027
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPTAR76EIZY7NQFENSOZO7U473257OVZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VN63GBTMRWO36Y7BKA2WQHROAKCXKCBL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/
- https://security.netapp.com/advisory/ntap-20220826-0005/
- https://www.debian.org/security/2022/dsa-5174
- https://www.openwall.com/lists/oss-security/2022/06/30/1
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-3576
- https://bugzilla.redhat.com/show_bug.cgi?id=2359465
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- https://access.redhat.com/errata/RHSA-2025:8411
- https://access.redhat.com/errata/RHSA-2025:9418
- https://access.redhat.com/errata/RHSA-2025:9430
- https://access.redhat.com/errata/RHSA-2025:11487
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://access.redhat.com/errata/RHSA-2025:13664
- https://access.redhat.com/errata/RHSA-2025:13777
- https://access.redhat.com/errata/RHSA-2025:15000
- https://access.redhat.com/errata/RHSA-2025:15002
- https://access.redhat.com/errata/RHSA-2025:15004
- https://access.redhat.com/errata/RHSA-2025:15001
- https://access.redhat.com/errata/RHSA-2025:15003
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-27536
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1895135
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-27535
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1892780
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with xn-- and should not be allowed to pattern match, but the wildcard check in curl could still check for x*, which would match even though the IDN name most likely contained nothing even resembling an x.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-28321
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- http://seclists.org/fulldisclosure/2023/Jul/47
- http://seclists.org/fulldisclosure/2023/Jul/48
- http://seclists.org/fulldisclosure/2023/Jul/52
- https://hackerone.com/reports/1950627
- https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1122812
- https://access.redhat.com/security/cve/CVE-2014-5044
- https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
- http://www.openwall.com/lists/oss-security/2014/07/24/1
- http://www.openwall.com/lists/oss-security/2014/07/31/6
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2019-12904
- https://dev.gnupg.org/T4541
- https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
- https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2024-2236
- https://access.redhat.com/errata/RHSA-2024:9404
- https://bugzilla.redhat.com/show_bug.cgi?id=2268268
- https://access.redhat.com/errata/RHSA-2025:3534
- https://access.redhat.com/errata/RHSA-2025:3530
- https://bugzilla.redhat.com/show_bug.cgi?id=2245218
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2021-40528
- https://eprint.iacr.org/2021/923
- https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
- https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
- https://access.redhat.com/errata/RHSA-2022:5311
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=3462280f2e23e16adf3ed5176e0f2413d8861320
- https://security.gentoo.org/glsa/202210-13
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://access.redhat.com/security/cve/CVE-2023-48795
- https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
- https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
- https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
- http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
- http://seclists.org/fulldisclosure/2024/Mar/21
- http://www.openwall.com/lists/oss-security/2023/12/18/3
- http://www.openwall.com/lists/oss-security/2023/12/19/5
- http://www.openwall.com/lists/oss-security/2023/12/20/3
- http://www.openwall.com/lists/oss-security/2024/03/06/3
- http://www.openwall.com/lists/oss-security/2024/04/17/8
- https://access.redhat.com/security/cve/cve-2023-48795
- https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
- https://bugs.gentoo.org/920280
- https://bugzilla.redhat.com/show_bug.cgi?id=2254210
- https://bugzilla.suse.com/show_bug.cgi?id=1217950
- https://crates.io/crates/thrussh/versions
- https://filezilla-project.org/versions.php
- https://forum.netgate.com/topic/184941/terrapin-ssh-attack
- https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
- https://github.com/NixOS/nixpkgs/pull/275249
- https://github.com/PowerShell/Win32-OpenSSH/issues/2189
- https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
- https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
- https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
- https://github.com/advisories/GHSA-45x7-px36-x8w8
- https://github.com/apache/mina-sshd/issues/445
- https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
- https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
- https://github.com/cyd01/KiTTY/issues/520
- https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
- https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
- https://github.com/erlang/otp/releases/tag/OTP-26.2.1
- https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
- https://github.com/hierynomus/sshj/issues/916
- https://github.com/janmojzis/tinyssh/issues/81
- https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
- https://github.com/libssh2/libssh2/pull/1291
- https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
- https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
- https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
- https://github.com/mwiede/jsch/issues/457
- https://github.com/mwiede/jsch/pull/461
- https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
- https://github.com/openssh/openssh-portable/commits/master
- https://github.com/paramiko/paramiko/issues/2337
- https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/issues/456
- https://github.com/rapier1/hpn-ssh/releases
- https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
- https://github.com/ronf/asyncssh/tags
- https://github.com/ssh-mitm/ssh-mitm/issues/165
- https://github.com/warp-tech/russh/releases/tag/v0.40.2
- https://gitlab.com/libssh/libssh-mirror/-/tags
- https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
- https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
- https://help.panic.com/releasenotes/transmit5/
- https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
- https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
- https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
- https://matt.ucc.asn.au/dropbear/CHANGES
- https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
- https://news.ycombinator.com/item?id=38684904
- https://news.ycombinator.com/item?id=38685286
- https://news.ycombinator.com/item?id=38732005
- https://nova.app/releases/#v11.8
- https://oryx-embedded.com/download/#changelog
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
- https://roumenpetrov.info/secsh/#news20231220
- https://security-tracker.debian.org/tracker/CVE-2023-48795
- https://security-tracker.debian.org/tracker/source-package/libssh2
- https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
- https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
- https://security.gentoo.org/glsa/202312-16
- https://security.gentoo.org/glsa/202312-17
- https://security.netapp.com/advisory/ntap-20240105-0004/
- https://support.apple.com/kb/HT214084
- https://thorntech.com/cve-2023-48795-and-sftp-gateway/
- https://twitter.com/TrueSkrillor/status/1736774389725565005
- https://ubuntu.com/security/CVE-2023-48795
- https://winscp.net/eng/docs/history#6.2.2
- https://www.bitvise.com/ssh-client-version-history#933
- https://www.bitvise.com/ssh-server-version-history
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
- https://www.debian.org/security/2023/dsa-5586
- https://www.debian.org/security/2023/dsa-5588
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
- https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
- https://www.netsarang.com/en/xshell-update-history/
- https://www.openssh.com/openbsd.html
- https://www.openssh.com/txt/release-9.6
- https://www.openwall.com/lists/oss-security/2023/12/18/2
- https://www.openwall.com/lists/oss-security/2023/12/20/3
- https://www.paramiko.org/changelog.html
- https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
- https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
- https://www.terrapin-attack.com
- https://www.theregister.com/2023/12/20/terrapin_attack_ssh
- https://www.vandyke.com/products/securecrt/history.txt
- https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-48795.yaml
- https://github.com/TrixSec/CVE-2023-48795
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1122812
- https://access.redhat.com/security/cve/CVE-2014-5044
- https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
- http://www.openwall.com/lists/oss-security/2014/07/24/1
- http://www.openwall.com/lists/oss-security/2014/07/31/6
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
medium severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- https://access.redhat.com/security/cve/CVE-2021-46848
- https://access.redhat.com/errata/RHSA-2023:0116
- https://access.redhat.com/errata/RHSA-2023:0343
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
- https://bugs.gentoo.org/866237
- https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
- https://gitlab.com/gnutls/libtasn1/-/issues/32
- https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
- https://security.netapp.com/advisory/ntap-20221118-0006/
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2023-28484
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/491
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
- https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
- https://security.netapp.com/advisory/ntap-20230601-0006/
- https://security.netapp.com/advisory/ntap-20240201-0005/
medium severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
Remediation
There is no fixed version for Centos:7 libxml2.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2023-28484
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/491
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
- https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
- https://security.netapp.com/advisory/ntap-20230601-0006/
- https://security.netapp.com/advisory/ntap-20240201-0005/
medium severity
new
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
Remediation
There is no fixed version for Centos:7 nss.
References
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.
Impact summary: Abnormal termination of an application can a cause a denial of service.
Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an otherName subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.
Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address.
TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate.
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-6119
- https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f
- https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6
- https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2
- https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0
- https://openssl-library.org/news/secadv/20240903.txt
- http://www.openwall.com/lists/oss-security/2024/09/03/4
- https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html
- https://security.netapp.com/advisory/ntap-20240912-0001/
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-4304
- https://access.redhat.com/errata/RHSA-2023:0946
- https://access.redhat.com/errata/RHSA-2023:1405
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
- Fixed in: 1:1.0.2k-22.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Remediation
Upgrade Centos:7 openssl-libs to version 1:1.0.2k-22.el7_9 or higher.
References
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://support.apple.com/kb/HT212528
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212534
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
- https://access.redhat.com/security/cve/CVE-2021-23841
- https://www.debian.org/security/2021/dsa-4855
- http://seclists.org/fulldisclosure/2021/May/67
- http://seclists.org/fulldisclosure/2021/May/68
- http://seclists.org/fulldisclosure/2021/May/70
- https://security.gentoo.org/glsa/202103-03
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:3798
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-13837
- https://github.com/python/cpython/commit/5a8b19677d818fb41ee55f310233772e15aa1a2b
- https://github.com/python/cpython/commit/694922cf40aa3a28f898b5f5ee08b71b4922df70
- https://github.com/python/cpython/commit/71fa8eb8233b37f16c88b6e3e583b461b205d1ba
- https://github.com/python/cpython/commit/b64441e4852383645af5b435411a6f849dd1b4cb
- https://github.com/python/cpython/issues/119342
- https://github.com/python/cpython/pull/119343
- https://mail.python.org/archives/list/security-announce@python.org/thread/2X5IBCJXRQAZ5PSERLHMSJFBHFR3QM2C/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Remediation
Upgrade Centos:7 python to version 0:2.7.5-92.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210226-0003/
- https://access.redhat.com/security/cve/CVE-2021-3177
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
- https://security.gentoo.org/glsa/202101-18
- https://bugs.python.org/issue42938
- https://github.com/python/cpython/pull/24239
- https://news.ycombinator.com/item?id=26185005
- https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2022:5235
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
Remediation
There is no fixed version for Centos:7 python.
References
- https://security.netapp.com/advisory/ntap-20210326-0004/
- https://access.redhat.com/security/cve/CVE-2021-23336
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
- https://security.gentoo.org/glsa/202104-04
- https://github.com/python/cpython/pull/24297
- https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
- https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
- https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
- http://www.openwall.com/lists/oss-security/2021/02/19/4
- http://www.openwall.com/lists/oss-security/2021/05/01/2
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1633
- https://access.redhat.com/errata/RHSA-2021:4151
- https://access.redhat.com/errata/RHSA-2021:4162
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
- https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
Remediation
There is no fixed version for Centos:7 python.
References
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-13837
- https://github.com/python/cpython/commit/5a8b19677d818fb41ee55f310233772e15aa1a2b
- https://github.com/python/cpython/commit/694922cf40aa3a28f898b5f5ee08b71b4922df70
- https://github.com/python/cpython/commit/71fa8eb8233b37f16c88b6e3e583b461b205d1ba
- https://github.com/python/cpython/commit/b64441e4852383645af5b435411a6f849dd1b4cb
- https://github.com/python/cpython/issues/119342
- https://github.com/python/cpython/pull/119343
- https://mail.python.org/archives/list/security-announce@python.org/thread/2X5IBCJXRQAZ5PSERLHMSJFBHFR3QM2C/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
- Fixed in: 0:2.7.5-92.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Remediation
Upgrade Centos:7 python-libs to version 0:2.7.5-92.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210226-0003/
- https://access.redhat.com/security/cve/CVE-2021-3177
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
- https://security.gentoo.org/glsa/202101-18
- https://bugs.python.org/issue42938
- https://github.com/python/cpython/pull/24239
- https://news.ycombinator.com/item?id=26185005
- https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2022:5235
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://security.netapp.com/advisory/ntap-20210326-0004/
- https://access.redhat.com/security/cve/CVE-2021-23336
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
- https://security.gentoo.org/glsa/202104-04
- https://github.com/python/cpython/pull/24297
- https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
- https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
- https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
- http://www.openwall.com/lists/oss-security/2021/02/19/4
- http://www.openwall.com/lists/oss-security/2021/05/01/2
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1633
- https://access.redhat.com/errata/RHSA-2021:4151
- https://access.redhat.com/errata/RHSA-2021:4162
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
- https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
Remediation
There is no fixed version for Centos:7 python-libs.
References
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://access.redhat.com/security/cve/CVE-2022-35737
- https://access.redhat.com/errata/RHSA-2023:0110
- https://access.redhat.com/errata/RHSA-2023:0339
- https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
- https://kb.cert.org/vuls/id/720344
- https://security.gentoo.org/glsa/202210-40
- https://security.netapp.com/advisory/ntap-20220915-0009/
- https://sqlite.org/releaselog/3_39_2.html
- https://www.sqlite.org/cves.html
- https://github.com/gmh5225/CVE-2022-35737
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
- Fixed in: 1:1.6.3-51.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
Remediation
Upgrade Centos:7 cups-libs to version 1:1.6.3-51.el7 or higher.
References
- https://access.redhat.com/security/cve/CVE-2017-18190
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1048
- https://github.com/apple/cups/commit/afa80cb2b457bf8d64f775bed307588610476c41
- https://lists.debian.org/debian-lts-announce/2018/02/msg00023.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html
- https://access.redhat.com/errata/RHSA-2020:3864
- https://usn.ubuntu.com/3577-1/
medium severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcom_err@1.42.9-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
Remediation
There is no fixed version for Centos:7 libcom_err.
References
- https://access.redhat.com/security/cve/CVE-2022-1304
- https://access.redhat.com/errata/RHSA-2022:7720
- https://access.redhat.com/errata/RHSA-2022:8361
- https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
- https://security.netapp.com/advisory/ntap-20241122-0010/
- https://bugzilla.redhat.com/show_bug.cgi?id=2069726
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20200327-0003/
- https://access.redhat.com/security/cve/CVE-2020-10029
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
- https://security.gentoo.org/glsa/202006-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=25487
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
- https://access.redhat.com/errata/RHSA-2021:0348
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
- https://usn.ubuntu.com/4416-1/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20200327-0003/
- https://access.redhat.com/security/cve/CVE-2020-10029
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
- https://security.gentoo.org/glsa/202006-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=25487
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
- https://access.redhat.com/errata/RHSA-2021:0348
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
- https://usn.ubuntu.com/4416-1/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/91528
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- https://access.redhat.com/security/cve/CVE-2016-4472
- https://security.gentoo.org/glsa/201701-21
- http://www.ubuntu.com/usn/USN-3013-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
medium severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
Remediation
There is no fixed version for Centos:7 giflib.
References
- http://www.securityfocus.com/bid/81697
- http://www.securityfocus.com/archive/1/537171/100/0/threaded
- https://source.android.com/security/bulletin/2017-05-01
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023474
- https://access.redhat.com/security/cve/CVE-2015-7555
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174876.html
- http://seclists.org/fulldisclosure/2015/Dec/83
- http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html
- http://www.securitytracker.com/id/1035331
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
Remediation
There is no fixed version for Centos:7 glib2.
References
medium severity
- Vulnerable module: harfbuzz
- Introduced through: harfbuzz@1.7.5-2.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › harfbuzz@1.7.5-2.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream harfbuzz package and not the harfbuzz package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.
Remediation
There is no fixed version for Centos:7 harfbuzz.
References
- http://www.securityfocus.com/bid/81812
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- https://code.google.com/p/chromium/issues/detail?id=544270
- https://code.google.com/p/chromium/issues/detail?id=579625
- https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
- https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
- https://access.redhat.com/security/cve/CVE-2016-2052
- https://security.gentoo.org/glsa/201701-76
- http://rhn.redhat.com/errata/RHSA-2016-0072.html
- https://access.redhat.com/errata/RHSA-2016:0072
- http://www.securitytracker.com/id/1034801
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
- http://www.ubuntu.com/usn/USN-2877-1
- http://www.ubuntu.com/usn/USN-3067-1
medium severity
- Vulnerable module: harfbuzz
- Introduced through: harfbuzz@1.7.5-2.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › harfbuzz@1.7.5-2.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream harfbuzz package and not the harfbuzz package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
hb-ot-layout-gpos-table.hh in HarfBuzz before 1.0.5 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data, a different vulnerability than CVE-2016-2052.
Remediation
There is no fixed version for Centos:7 harfbuzz.
References
- http://www.securityfocus.com/bid/92039
- https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e
- https://github.com/behdad/harfbuzz/issues/139#issuecomment-146984679
- https://access.redhat.com/security/cve/CVE-2015-8947
- https://security.gentoo.org/glsa/201701-76
- https://lists.debian.org/debian-lts-announce/2019/12/msg00022.html
- http://rhn.redhat.com/errata/RHSA-2016-0072.html
- https://access.redhat.com/errata/RHSA-2016:0072
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
- http://www.ubuntu.com/usn/USN-3067-1
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-4645
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
- https://security.netapp.com/advisory/ntap-20230331-0001/
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.
Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.
Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-9230
- https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
- https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
- https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
- https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
- https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
- https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
- https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
- https://openssl-library.org/news/secadv/20250930.txt
- https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html
- http://www.openwall.com/lists/oss-security/2025/09/30/5
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The fts3_tokenizer function in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a SQL command that triggers an API call with a crafted pointer value in the second argument.
Remediation
There is no fixed version for Centos:7 sqlite.
References
medium severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.
Remediation
There is no fixed version for Centos:7 tar.
References
- https://access.redhat.com/security/cve/CVE-2025-45582
- https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md
- https://www.gnu.org/software/tar/
- https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html
- https://www.gnu.org/software/tar/manual/html_node/Integrity.html
- https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html
- http://www.openwall.com/lists/oss-security/2025/11/01/6
medium severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Remediation
There is no fixed version for Centos:7 tar.
References
- http://www.securityfocus.com/bid/93937
- http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
- https://access.redhat.com/security/cve/CVE-2016-6321
- http://www.debian.org/security/2016/dsa-3702
- http://seclists.org/fulldisclosure/2016/Oct/102
- http://seclists.org/fulldisclosure/2016/Oct/96
- https://security.gentoo.org/glsa/201611-19
- http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
- https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
- http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.ubuntu.com/usn/USN-3132-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
new
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
new
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although CLIENTS_MAX is defined, server_work() unconditionally accept()s and client_new() always appends the new client and increments n_clients. There is no check against the limit. When client cannot be accepted as a result of maximal socket number of avahi-daemon, it logs unconditionally error per each connection. Unprivileged local users can exhaust daemon memory and file descriptors, causing a denial of service system-wide for mDNS/DNS-SD. Exhausting local file descriptors causes increased system load caused by logging errors of each of request. Overloading prevents glibc calls using nss-mdns plugins to resolve *.local. names and link-local addresses. As of time of publication, no known patched versions are available, but a candidate fix is available in pull request 808, and some workarounds are available. Simple clients are offered for nss-mdns package functionality. It is not possible to disable the unix socket /run/avahi-daemon/socket, but resolution requests received via DBus are not affected directly. Tools avahi-resolve, avahi-resolve-address and avahi-resolve-host-name are not affected, they use DBus interface. It is possible to change permissions of unix socket after avahi-daemon is started. But avahi-daemon does not provide any configuration for it. Additional access restrictions like SELinux can also prevent unwanted tools to access the socket and keep resolution working for trusted users.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/105689
- https://access.redhat.com/security/cve/CVE-2018-18483
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
- https://sourceware.org/bugzilla/show_bug.cgi?id=23767
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2022-4285
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768
- https://security.gentoo.org/glsa/202309-15
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://access.redhat.com/security/cve/CVE-2020-16592
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25823
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://access.redhat.com/security/cve/CVE-2020-16590
- https://sourceware.org/bugzilla/show_bug.cgi?id=25821
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).
Remediation
There is no fixed version for Centos:7 bsdtar.
References
medium severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
Remediation
There is no fixed version for Centos:7 cpio.
References
- https://access.redhat.com/security/cve/CVE-2023-7207
- http://www.openwall.com/lists/oss-security/2024/01/05/1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
- https://www.openwall.com/lists/oss-security/2023/12/21/8
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-27538
- https://curl.se/docs/CVE-2023-27538.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1898475
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.
Remediation
There is no fixed version for Centos:7 expat.
References
- https://access.redhat.com/security/cve/CVE-2023-52426
- https://cwe.mitre.org/data/definitions/776.html
- https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404
- https://github.com/libexpat/libexpat/pull/777
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
- https://security.netapp.com/advisory/ntap-20240307-0005/
medium severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RGB() in gif2rgb.c:298:45.
Remediation
There is no fixed version for Centos:7 giflib.
References
- https://access.redhat.com/security/cve/CVE-2022-28506
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4CJSHXBD2RS5OJNWSHQZVMTQCCTIPYS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEAFUZXOOJJVFYRQM6IIJ7LMLEKCCESG/
- https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png
- https://github.com/verf1sh/Poc/blob/master/giflib_poc
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4CJSHXBD2RS5OJNWSHQZVMTQCCTIPYS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEAFUZXOOJJVFYRQM6IIJ7LMLEKCCESG/
- https://sourceforge.net/p/giflib/bugs/159/
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2021-3800
- https://access.redhat.com/errata/RHSA-2021:4385
- https://bugzilla.redhat.com/show_bug.cgi?id=1938284
- https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
- https://lists.debian.org/debian-lts-announce/2022/09/msg00020.html
- https://security.netapp.com/advisory/ntap-20221028-0004/
- https://www.openwall.com/lists/oss-security/2017/06/23/8
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://access.redhat.com/security/cve/CVE-2025-0395
- https://sourceware.org/bugzilla/show_bug.cgi?id=32582
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
- https://sourceware.org/pipermail/libc-announce/2025/000044.html
- https://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/23/2
- https://security.netapp.com/advisory/ntap-20250228-0006/
- http://www.openwall.com/lists/oss-security/2025/04/13/1
- http://www.openwall.com/lists/oss-security/2025/04/24/7
- https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://access.redhat.com/security/cve/CVE-2025-0395
- https://sourceware.org/bugzilla/show_bug.cgi?id=32582
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
- https://sourceware.org/pipermail/libc-announce/2025/000044.html
- https://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/23/2
- https://security.netapp.com/advisory/ntap-20250228-0006/
- http://www.openwall.com/lists/oss-security/2025/04/13/1
- http://www.openwall.com/lists/oss-security/2025/04/24/7
- https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-26927
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/
- https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b
- https://github.com/jasper-software/jasper/issues/265
- https://access.redhat.com/errata/RHSA-2021:4235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.26 handled component references in CDEF box in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3467
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWAIUFNIUCGS2IMGGDTWZIUIY7BNLGKF/
- https://bugzilla.redhat.com/show_bug.cgi?id=1942097
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWAIUFNIUCGS2IMGGDTWZIUIY7BNLGKF/
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-26926
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/
- https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b
- https://github.com/jasper-software/jasper/issues/264
- https://access.redhat.com/errata/RHSA-2021:4235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3272
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BZFU2F6UW4L2FJE65WJLWGUIELDWCL7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD2Y2LT4N5ZWCMKYCUIKB3XODNJLOW3J/
- https://github.com/jasper-software/jasper/issues/259
- https://access.redhat.com/errata/RHSA-2021:4235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BZFU2F6UW4L2FJE65WJLWGUIELDWCL7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HD2Y2LT4N5ZWCMKYCUIKB3XODNJLOW3J/
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_firstone in libjasper/jpc/jpc_math.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).
Remediation
There is no fixed version for Centos:7 libarchive.
References
medium severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Remediation
There is no fixed version for Centos:7 libblkid.
References
- https://access.redhat.com/security/cve/CVE-2022-0563
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- https://security.gentoo.org/glsa/202401-08
- https://security.netapp.com/advisory/ntap-20220331-0002/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-27538
- https://curl.se/docs/CVE-2023-27538.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1898475
- https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0010/
medium severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Remediation
There is no fixed version for Centos:7 libmount.
References
- https://access.redhat.com/security/cve/CVE-2022-0563
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- https://security.gentoo.org/glsa/202401-08
- https://security.netapp.com/advisory/ntap-20220331-0002/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2953
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json
- https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3
- https://gitlab.com/libtiff/libtiff/-/issues/414
- https://security.netapp.com/advisory/ntap-20221014-0008/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-3570
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json
- https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
- https://gitlab.com/libtiff/libtiff/-/issues/381
- https://gitlab.com/libtiff/libtiff/-/issues/386
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230203-0002/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
TIFFClientOpen in tif_unix.c in LibTIFF 3.8.2 has memory leaks, as demonstrated by bmp2tiff.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0561
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://www.debian.org/security/2022/dsa-5108
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0562
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
- https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://www.debian.org/security/2022/dsa-5108
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-3316
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-22844
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220311-0002/
- https://www.debian.org/security/2022/dsa-5108
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-48281
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2023-0799
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
medium severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Remediation
There is no fixed version for Centos:7 libuuid.
References
- https://access.redhat.com/security/cve/CVE-2022-0563
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- https://security.gentoo.org/glsa/202401-08
- https://security.netapp.com/advisory/ntap-20220331-0002/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.
Remediation
There is no fixed version for Centos:7 libxslt.
References
medium severity
- Vulnerable module: lua
- Introduced through: lua@5.1.4-15.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › lua@5.1.4-15.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream lua package and not the lua package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.
Remediation
There is no fixed version for Centos:7 lua.
References
- https://access.redhat.com/security/cve/CVE-2021-43519
- https://access.redhat.com/errata/RHSA-2023:0957
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
- http://lua-users.org/lists/lua-l/2021-10/msg00123.html
- http://lua-users.org/lists/lua-l/2021-11/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://seclists.org/bugtraq/2019/Oct/0
- https://seclists.org/bugtraq/2019/Oct/1
- https://seclists.org/bugtraq/2019/Sep/25
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
- https://security.netapp.com/advisory/ntap-20190919-0002/
- https://security.netapp.com/advisory/ntap-20200122-0002/
- https://security.netapp.com/advisory/ntap-20200416-0003/
- https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
- https://www.openssl.org/news/secadv/20190910.txt
- https://www.tenable.com/security/tns-2019-08
- https://www.tenable.com/security/tns-2019-09
- https://access.redhat.com/security/cve/CVE-2019-1547
- https://www.debian.org/security/2019/dsa-4539
- https://www.debian.org/security/2019/dsa-4540
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
- https://security.gentoo.org/glsa/201911-04
- http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
- https://arxiv.org/abs/1909.01785
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:1840
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
- https://usn.ubuntu.com/4376-1/
- https://usn.ubuntu.com/4376-2/
- https://usn.ubuntu.com/4504-1/
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: pam
- Introduced through: pam@1.1.8-23.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pam@1.1.8-23.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pam package and not the pam package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Remediation
There is no fixed version for Centos:7 pam.
References
- https://access.redhat.com/security/cve/CVE-2024-22365
- http://www.openwall.com/lists/oss-security/2024/01/18/3
- https://github.com/linux-pam/linux-pam
- https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
- https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
- https://lists.debian.org/debian-lts-announce/2025/09/msg00021.html
medium severity
- Vulnerable module: pcsc-lite-libs
- Introduced through: pcsc-lite-libs@1.8.8-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcsc-lite-libs@1.8.8-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcsc-lite-libs package and not the pcsc-lite-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
Remediation
There is no fixed version for Centos:7 pcsc-lite-libs.
References
- http://www.securityfocus.com/bid/95263
- https://salsa.debian.org/rousseau/PCSC/-/commit/697fe05967af7ea215bcd5d5774be587780c9e22
- https://access.redhat.com/security/cve/CVE-2016-10109
- http://www.debian.org/security/2017/dsa-3752
- https://security.gentoo.org/glsa/201702-01
- https://lists.alioth.debian.org/pipermail/pcsclite-muscle/Week-of-Mon-20161226/000779.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2017/01/03/3
- http://www.ubuntu.com/usn/USN-3176-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2007-4559
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- http://mail.python.org/pipermail/python-dev/2007-August/074290.html
- http://mail.python.org/pipermail/python-dev/2007-August/074292.html
- http://secunia.com/advisories/26623
- http://www.vupen.com/english/advisories/2007/3022
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- https://security.gentoo.org/glsa/202309-06
- https://github.com/advanced-threat-research/Creosote
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2007-4559
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- http://mail.python.org/pipermail/python-dev/2007-August/074290.html
- http://mail.python.org/pipermail/python-dev/2007-August/074292.html
- http://secunia.com/advisories/26623
- http://www.vupen.com/english/advisories/2007/3022
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- https://security.gentoo.org/glsa/202309-06
- https://github.com/advanced-threat-research/Creosote
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20200608-0002/
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- https://access.redhat.com/security/cve/CVE-2020-13631
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
- http://seclists.org/fulldisclosure/2020/Dec/32
- http://seclists.org/fulldisclosure/2020/Nov/19
- http://seclists.org/fulldisclosure/2020/Nov/20
- http://seclists.org/fulldisclosure/2020/Nov/22
- https://security.gentoo.org/glsa/202007-26
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- https://sqlite.org/src/info/eca0ba2cf4c0fdf7
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:4442
- https://access.redhat.com/errata/RHSA-2021:1968
- https://usn.ubuntu.com/4394-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://access.redhat.com/security/cve/CVE-2025-29088
- https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248
- https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4
- https://sqlite.org/forum/forumpost/48f365daec
- https://sqlite.org/releaselog/3_49_1.html
- https://www.sqlite.org/cves.html
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory.
Remediation
There is no fixed version for Centos:7 sqlite.
References
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20200528-0004/
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- https://access.redhat.com/security/cve/CVE-2020-13435
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
- http://seclists.org/fulldisclosure/2020/Dec/32
- http://seclists.org/fulldisclosure/2020/Nov/19
- http://seclists.org/fulldisclosure/2020/Nov/20
- http://seclists.org/fulldisclosure/2020/Nov/22
- https://security.gentoo.org/glsa/202007-26
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.sqlite.org/src/info/7a5279a25c57adf1
- https://access.redhat.com/errata/RHSA-2021:4396
- https://usn.ubuntu.com/4394-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://access.redhat.com/security/cve/CVE-2019-19645
- https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://usn.ubuntu.com/4394-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.tenable.com/security/tns-2021-14
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2022-45873
- https://access.redhat.com/errata/RHSA-2023:0954
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2022-4415
- https://access.redhat.com/errata/RHSA-2023:0837
- https://access.redhat.com/errata/RHSA-2023:0954
- https://security.netapp.com/advisory/ntap-20230216-0010/
- http://seclists.org/fulldisclosure/2025/Jun/9
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://www.openwall.com/lists/oss-security/2022/12/21/3
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2022-3821
- https://access.redhat.com/errata/RHSA-2023:0100
- https://access.redhat.com/errata/RHSA-2023:0336
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/pull/23933
- https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
- https://security.gentoo.org/glsa/202305-15
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.
Remediation
There is no fixed version for Centos:7 systemd.
References
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-45873
- https://access.redhat.com/errata/RHSA-2023:0954
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-4415
- https://access.redhat.com/errata/RHSA-2023:0837
- https://access.redhat.com/errata/RHSA-2023:0954
- https://security.netapp.com/advisory/ntap-20230216-0010/
- http://seclists.org/fulldisclosure/2025/Jun/9
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://www.openwall.com/lists/oss-security/2022/12/21/3
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-3821
- https://access.redhat.com/errata/RHSA-2023:0100
- https://access.redhat.com/errata/RHSA-2023:0336
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/pull/23933
- https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
- https://security.gentoo.org/glsa/202305-15
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
medium severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
Remediation
There is no fixed version for Centos:7 tar.
References
- https://access.redhat.com/security/cve/CVE-2022-48303
- https://access.redhat.com/errata/RHSA-2023:0842
- https://access.redhat.com/errata/RHSA-2023:0959
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/
- https://savannah.gnu.org/bugs/?62387
- https://savannah.gnu.org/patch/?10307
medium severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
Remediation
There is no fixed version for Centos:7 unzip.
References
- http://www.securityfocus.com/bid/76863
- https://access.redhat.com/security/cve/CVE-2015-7696
- http://www.debian.org/security/2015/dsa-3386
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/09/21/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
medium severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
Remediation
There is no fixed version for Centos:7 unzip.
References
- http://www.securityfocus.com/bid/76863
- https://access.redhat.com/security/cve/CVE-2015-7697
- http://www.debian.org/security/2015/dsa-3386
- http://sourceforge.net/p/infozip/patches/23/
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
medium severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Remediation
There is no fixed version for Centos:7 util-linux.
References
- https://access.redhat.com/security/cve/CVE-2022-0563
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- https://security.gentoo.org/glsa/202401-08
- https://security.netapp.com/advisory/ntap-20220331-0002/
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Out-of-bounds Read
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- https://access.redhat.com/security/cve/CVE-2021-4193
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://access.redhat.com/errata/RHSA-2022:0366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- http://seclists.org/fulldisclosure/2022/Jul/14
- http://seclists.org/fulldisclosure/2022/Mar/29
- http://seclists.org/fulldisclosure/2022/May/35
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- https://security.gentoo.org/glsa/202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7_9.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
Remediation
Upgrade Centos:7 curl to version 0:7.29.0-59.el7_9.1 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-8177
- https://www.debian.org/security/2021/dsa-4881
- https://curl.se/docs/CVE-2020-8177.html
- https://hackerone.com/reports/887462
- https://access.redhat.com/errata/RHSA-2020:5002
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7_9.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
Remediation
Upgrade Centos:7 libcurl to version 0:7.29.0-59.el7_9.1 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-8177
- https://www.debian.org/security/2021/dsa-4881
- https://curl.se/docs/CVE-2020-8177.html
- https://hackerone.com/reports/887462
- https://access.redhat.com/errata/RHSA-2020:5002
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2019-17595
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2019-17595
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2019-17595
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.
Remediation
There is no fixed version for Centos:7 python.
References
- http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
- http://bugs.python.org/issue17239
- https://bugs.launchpad.net/keystone/+bug/1100279
- https://access.redhat.com/security/cve/CVE-2013-1665
- http://www.debian.org/security/2013/dsa-2634
- http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
- http://www.openwall.com/lists/oss-security/2013/02/19/2
- http://www.openwall.com/lists/oss-security/2013/02/19/4
- http://rhn.redhat.com/errata/RHSA-2013-0657.html
- http://rhn.redhat.com/errata/RHSA-2013-0658.html
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
- http://bugs.python.org/issue17239
- https://bugs.launchpad.net/keystone/+bug/1100279
- https://access.redhat.com/security/cve/CVE-2013-1665
- http://www.debian.org/security/2013/dsa-2634
- http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
- http://www.openwall.com/lists/oss-security/2013/02/19/2
- http://www.openwall.com/lists/oss-security/2013/02/19/4
- http://rhn.redhat.com/errata/RHSA-2013-0657.html
- http://rhn.redhat.com/errata/RHSA-2013-0658.html
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: avahi-libs
- Introduced through: avahi-libs@0.6.31-20.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › avahi-libs@0.6.31-20.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi-libs package and not the avahi-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Remediation
There is no fixed version for Centos:7 avahi-libs.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
Remediation
There is no fixed version for Centos:7 bind-license.
References
- https://kb.isc.org/v1/docs/cve-2021-25219
- https://access.redhat.com/security/cve/CVE-2021-25219
- https://www.debian.org/security/2021/dsa-4994
- https://access.redhat.com/errata/RHSA-2022:2092
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
- https://security.gentoo.org/glsa/202210-25
- https://security.netapp.com/advisory/ntap-20211118-0002/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.13
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.13 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-2795
- https://access.redhat.com/errata/RHSA-2023:0402
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- http://www.openwall.com/lists/oss-security/2022/09/21/3
- https://kb.isc.org/docs/cve-2022-2795
- https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- https://security.gentoo.org/glsa/202210-25
- https://security.netapp.com/advisory/ntap-20241129-0002/
- https://www.debian.org/security/2022/dsa-5235
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://support.f5.com/csp/article/K42059040
- https://access.redhat.com/security/cve/CVE-2019-9075
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
- https://security.gentoo.org/glsa/202107-24
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 binutils.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-7545
- https://sourceware.org/bugzilla/attachment.cgi?id=16117
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
- https://vuldb.com/?ctiid.316243
- https://vuldb.com/?id.316243
- https://vuldb.com/?submit.614355
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-7546
- https://sourceware.org/bugzilla/attachment.cgi?id=16118
- https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b
- https://vuldb.com/?ctiid.316244
- https://vuldb.com/?id.316244
- https://vuldb.com/?submit.614375
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33050
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11083
- https://sourceware.org/bugzilla/attachment.cgi?id=16353
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
- https://vuldb.com/?ctiid.326124
- https://vuldb.com/?id.326124
- https://vuldb.com/?submit.661277
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11081
- https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt
- https://sourceware.org/bugzilla/show_bug.cgi?id=33406
- https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
- https://vuldb.com/?ctiid.326122
- https://vuldb.com/?id.326122
- https://vuldb.com/?submit.661275
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11082
- https://sourceware.org/bugzilla/attachment.cgi?id=16358
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
- https://vuldb.com/?ctiid.326123
- https://vuldb.com/?id.326123
- https://vuldb.com/?submit.661276
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2021-45078
- https://sourceware.org/bugzilla/show_bug.cgi?id=28694
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
- https://security.gentoo.org/glsa/202208-30
- https://security.netapp.com/advisory/ntap-20220107-0002/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://support.f5.com/csp/article/K09092524
- https://access.redhat.com/security/cve/CVE-2019-9074
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
- https://security.gentoo.org/glsa/202107-24
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and not using thetrailing dot in the URL.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-30115
- http://www.openwall.com/lists/oss-security/2022/10/26/4
- http://www.openwall.com/lists/oss-security/2022/12/21/1
- https://hackerone.com/reports/1557449
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-32208
- https://access.redhat.com/errata/RHSA-2022:6157
- https://access.redhat.com/errata/RHSA-2022:6159
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- https://hackerone.com/reports/1590071
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220915-0003/
- https://support.apple.com/kb/HT213488
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94103
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8624
- https://security.gentoo.org/glsa/201701-47
- https://curl.haxx.se/docs/adv_20161102J.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94107
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
- https://curl.haxx.se/CVE-2016-8625.patch
- https://curl.haxx.se/docs/adv_20161102K.html
- https://www.tenable.com/security/tns-2016-21
- https://access.redhat.com/security/cve/CVE-2016-8625
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
- A cookie is set using the
securekeyword forhttps://target - curl is redirected to or otherwise made to speak with
http://target(same hostname, but using clear text HTTP) using the same cookie set - The same cookie name is set - but with just a slash as path (
path=\"/\",). Since this site is not secure, the cookie should just be ignored. - A bug in the path comparison logic makes curl read outside a heap buffer boundary
The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
- https://curl.haxx.se/CVE-2016-8615.patch
- https://curl.haxx.se/docs/adv_20161102A.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8615
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The libcurl API function called curl_maprintf() before version 7.51.0 can be tricked into doing a double-free due to an unsafe size_t multiplication, on systems using 32 bit size_t variables.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94098
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
- https://curl.haxx.se/docs/adv_20161102D.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8618
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The function read_data() in security.c in curl before version 7.51.0 is vulnerable to memory double free.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94100
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
- https://curl.haxx.se/CVE-2016-8619.patch
- https://curl.haxx.se/docs/adv_20161102E.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8619
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
medium severity
- Vulnerable module: fribidi
- Introduced through: fribidi@1.0.2-1.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › fribidi@1.0.2-1.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream fribidi package and not the fribidi package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
Remediation
There is no fixed version for Centos:7 fribidi.
References
- https://access.redhat.com/security/cve/CVE-2022-25309
- https://access.redhat.com/errata/RHSA-2022:7514
- https://access.redhat.com/errata/RHSA-2022:8011
- https://bugzilla.redhat.com/show_bug.cgi?id=2047896
- https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3
- https://github.com/fribidi/fribidi/issues/182
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/72740
- https://sourceware.org/bugzilla/show_bug.cgi?id=17269
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
- https://access.redhat.com/security/cve/CVE-2015-8983
- https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
medium severity
new
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Remediation
There is no fixed version for Centos:7 glibc.
References
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/72740
- https://sourceware.org/bugzilla/show_bug.cgi?id=17269
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
- https://access.redhat.com/security/cve/CVE-2015-8983
- https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
medium severity
new
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
medium severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- https://access.redhat.com/security/cve/CVE-2014-4617
- http://www.debian.org/security/2014/dsa-2967
- http://www.debian.org/security/2014/dsa-2968
- http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
- http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html
- http://secunia.com/advisories/59213
- http://secunia.com/advisories/59351
- http://secunia.com/advisories/59534
- http://secunia.com/advisories/59578
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html
- http://www.ubuntu.com/usn/USN-2258-1
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
medium severity
new
- Vulnerable module: harfbuzz
- Introduced through: harfbuzz@1.7.5-2.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › harfbuzz@1.7.5-2.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream harfbuzz package and not the harfbuzz package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.
Remediation
There is no fixed version for Centos:7 harfbuzz.
References
- https://access.redhat.com/security/cve/CVE-2026-22693
- https://github.com/harfbuzz/harfbuzz/commit/1265ff8d990284f04d8768f35b0e20ae5f60daae
- https://github.com/harfbuzz/harfbuzz/security/advisories/GHSA-xvjr-f2r9-c7ww
- http://www.openwall.com/lists/oss-security/2026/01/11/1
- http://www.openwall.com/lists/oss-security/2026/01/12/1
medium severity
- Vulnerable module: iputils
- Introduced through: iputils@20160308-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › iputils@20160308-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream iputils package and not the iputils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ping in iputils before 20250602 allows a denial of service (application error in adaptive ping mode or incorrect data collection) via a crafted ICMP Echo Reply packet, because a zero timestamp can lead to large intermediate values that have an integer overflow when squared during statistics calculations. NOTE: this issue exists because of an incomplete fix for CVE-2025-47268 (that fix was only about timestamp calculations, and it did not account for a specific scenario where the original timestamp in the ICMP payload is zero).
Remediation
There is no fixed version for Centos:7 iputils.
References
- https://access.redhat.com/security/cve/CVE-2025-48964
- https://bugzilla.suse.com/show_bug.cgi?id=1243772
- https://github.com/iputils/iputils/issues
- https://github.com/iputils/iputils/security/advisories/GHSA-25fr-jw29-74f9
- https://github.com/iputils/iputils/commit/afa36390394a6e0cceba03b52b59b6d41710608c
- https://github.com/iputils/iputils/releases/tag/20250602
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21294
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21340
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21360
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21628
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf; Oracle GraalVM Enterprise Edition: 20.3.11 and 21.3.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21296
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22081
- https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
- https://security.netapp.com/advisory/ntap-20231027-0006/
- https://security.netapp.com/advisory/ntap-20241108-0002/
- https://www.debian.org/security/2023/dsa-5537
- https://www.debian.org/security/2023/dsa-5548
- https://www.oracle.com/security-alerts/cpuoct2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21282
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21293
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21341
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21305
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21365
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21299
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21626
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14803
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21283
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.292.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.292.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210513-0001/
- https://access.redhat.com/security/cve/CVE-2021-2163
- https://www.debian.org/security/2021/dsa-4899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://www.oracle.com/security-alerts/cpuapr2021.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
- https://access.redhat.com/errata/RHSA-2021:1298
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://security.gentoo.org/glsa/202209-05
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21340
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21294
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21360
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21628
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf; Oracle GraalVM Enterprise Edition: 20.3.11 and 21.3.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21296
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22081
- https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
- https://security.netapp.com/advisory/ntap-20231027-0006/
- https://security.netapp.com/advisory/ntap-20241108-0002/
- https://www.debian.org/security/2023/dsa-5537
- https://www.debian.org/security/2023/dsa-5548
- https://www.oracle.com/security-alerts/cpuoct2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21282
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21293
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21341
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21305
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21365
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21299
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21626
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14803
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21283
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.292.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.292.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210513-0001/
- https://access.redhat.com/security/cve/CVE-2021-2163
- https://www.debian.org/security/2021/dsa-4899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://www.oracle.com/security-alerts/cpuapr2021.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
- https://access.redhat.com/errata/RHSA-2021:1298
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://security.gentoo.org/glsa/202209-05
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21294
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21340
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21360
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21628
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf; Oracle GraalVM Enterprise Edition: 20.3.11 and 21.3.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21296
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.392.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.392.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22081
- https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
- https://security.netapp.com/advisory/ntap-20231027-0006/
- https://security.netapp.com/advisory/ntap-20241108-0002/
- https://www.debian.org/security/2023/dsa-5537
- https://www.debian.org/security/2023/dsa-5548
- https://www.oracle.com/security-alerts/cpuoct2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21282
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21293
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21341
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21305
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21365
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21299
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21626
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14803
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21283
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.292.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.292.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210513-0001/
- https://access.redhat.com/security/cve/CVE-2021-2163
- https://www.debian.org/security/2021/dsa-4899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://www.oracle.com/security-alerts/cpuapr2021.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
- https://access.redhat.com/errata/RHSA-2021:1298
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
- https://security.gentoo.org/glsa/202209-05
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.
Remediation
There is no fixed version for Centos:7 libarchive.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and not using thetrailing dot in the URL.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-30115
- http://www.openwall.com/lists/oss-security/2022/10/26/4
- http://www.openwall.com/lists/oss-security/2022/12/21/1
- https://hackerone.com/reports/1557449
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-32208
- https://access.redhat.com/errata/RHSA-2022:6157
- https://access.redhat.com/errata/RHSA-2022:6159
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- https://hackerone.com/reports/1590071
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220915-0003/
- https://support.apple.com/kb/HT213488
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94103
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8624
- https://security.gentoo.org/glsa/201701-47
- https://curl.haxx.se/docs/adv_20161102J.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94107
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
- https://curl.haxx.se/CVE-2016-8625.patch
- https://curl.haxx.se/docs/adv_20161102K.html
- https://www.tenable.com/security/tns-2016-21
- https://access.redhat.com/security/cve/CVE-2016-8625
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
- A cookie is set using the
securekeyword forhttps://target - curl is redirected to or otherwise made to speak with
http://target(same hostname, but using clear text HTTP) using the same cookie set - The same cookie name is set - but with just a slash as path (
path=\"/\",). Since this site is not secure, the cookie should just be ignored. - A bug in the path comparison logic makes curl read outside a heap buffer boundary
The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
- https://curl.haxx.se/CVE-2016-8615.patch
- https://curl.haxx.se/docs/adv_20161102A.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8615
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The function read_data() in security.c in curl before version 7.51.0 is vulnerable to memory double free.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94100
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
- https://curl.haxx.se/CVE-2016-8619.patch
- https://curl.haxx.se/docs/adv_20161102E.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8619
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The libcurl API function called curl_maprintf() before version 7.51.0 can be tricked into doing a double-free due to an unsafe size_t multiplication, on systems using 32 bit size_t variables.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94098
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
- https://curl.haxx.se/docs/adv_20161102D.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8618
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 libgcc.
References
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
medium severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- https://access.redhat.com/security/cve/CVE-2024-12133
- https://bugzilla.redhat.com/show_bug.cgi?id=2344611
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://access.redhat.com/errata/RHSA-2025:4049
- https://access.redhat.com/errata/RHSA-2025:7077
- https://access.redhat.com/errata/RHSA-2025:8021
- https://security.netapp.com/advisory/ntap-20250523-0003/
- https://access.redhat.com/errata/RHSA-2025:8385
- https://access.redhat.com/errata/RHSA-2025:17347
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7_9.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
Remediation
Upgrade Centos:7 libxml2 to version 0:2.9.1-6.el7_9.6 or higher.
References
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
- http://www.securityfocus.com/bid/93054
- https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- https://support.apple.com/HT207143
- https://support.apple.com/HT207170
- https://access.redhat.com/security/cve/CVE-2016-4658
- https://security.gentoo.org/glsa/201701-37
- https://access.redhat.com/errata/RHSA-2021:3810
- http://www.securitytracker.com/id/1036858
- http://www.securitytracker.com/id/1038623
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
- Fixed in: 0:2.9.1-6.el7_9.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
Remediation
Upgrade Centos:7 libxml2-python to version 0:2.9.1-6.el7_9.6 or higher.
References
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
- http://www.securityfocus.com/bid/93054
- https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- https://support.apple.com/HT207143
- https://support.apple.com/HT207170
- https://access.redhat.com/security/cve/CVE-2016-4658
- https://security.gentoo.org/glsa/201701-37
- https://access.redhat.com/errata/RHSA-2021:3810
- http://www.securitytracker.com/id/1036858
- http://www.securitytracker.com/id/1038623
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://www.securityfocus.com/bid/77325
- https://bugzilla.redhat.com/show_bug.cgi?id=1257962
- https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://puppet.com/security/cve/cve-2015-7995
- https://support.apple.com/HT205729
- https://support.apple.com/HT205731
- https://support.apple.com/HT205732
- https://support.apple.com/HT206168
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://access.redhat.com/security/cve/CVE-2015-7995
- http://www.debian.org/security/2016/dsa-3605
- http://www.openwall.com/lists/oss-security/2015/10/27/10
- http://www.openwall.com/lists/oss-security/2015/10/28/4
- http://www.securitytracker.com/id/1034736
- http://www.securitytracker.com/id/1038623
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.386546
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html
medium severity
- Vulnerable module: lua
- Introduced through: lua@5.1.4-15.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › lua@5.1.4-15.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream lua package and not the lua package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
Remediation
There is no fixed version for Centos:7 lua.
References
- http://www.securityfocus.com/bid/69342
- http://advisories.mageia.org/MGASA-2014-0414.html
- http://www.lua.org/bugs.html#5.2.2-1
- https://access.redhat.com/security/cve/CVE-2014-5461
- http://www.debian.org/security/2014/dsa-3015
- http://www.debian.org/security/2014/dsa-3016
- https://security.gentoo.org/glsa/201701-53
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:144
- http://www.openwall.com/lists/oss-security/2014/08/21/1
- http://www.openwall.com/lists/oss-security/2014/08/21/4
- http://www.openwall.com/lists/oss-security/2014/08/27/2
- http://secunia.com/advisories/59890
- http://secunia.com/advisories/60869
- http://secunia.com/advisories/61411
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html
- http://www.ubuntu.com/usn/USN-2338-1
- https://security.gentoo.org/glsa/202305-23
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2019-17594
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-10684
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1464687
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2019-17594
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-10684
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1464687
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2019-17594
- https://security.gentoo.org/glsa/202101-28
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
- https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
- https://access.redhat.com/errata/RHSA-2021:4426
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-10684
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1464687
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
Remediation
There is no fixed version for Centos:7 nss-softokn.
References
- http://www.securityfocus.com/bid/75871
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://kc.mcafee.com/corporate/index?page=content&id=SB10139
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2613
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201603-14
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- https://access.redhat.com/errata/RHSA-2015:1485
- http://www.securitytracker.com/id/1032910
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
Remediation
There is no fixed version for Centos:7 nss-softokn-freebl.
References
- http://www.securityfocus.com/bid/75871
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://kc.mcafee.com/corporate/index?page=content&id=SB10139
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2613
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201603-14
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- https://access.redhat.com/errata/RHSA-2015:1485
- http://www.securitytracker.com/id/1032910
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://access.redhat.com/security/cve/CVE-2019-17023
- https://www.debian.org/security/2020/dsa-4726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
- https://access.redhat.com/errata/RHSA-2020:4076
- https://usn.ubuntu.com/4234-1/
- https://usn.ubuntu.com/4397-1/
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.
As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.
Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.
Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-0466
- http://www.openwall.com/lists/oss-security/2023/09/28/4
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230414-0001/
- https://www.debian.org/security/2023/dsa-5417
- https://www.openssl.org/news/secadv/20230328.txt
medium severity
- Vulnerable module: p11-kit
- Introduced through: p11-kit@0.23.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › p11-kit@0.23.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream p11-kit package and not the p11-kit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
Remediation
There is no fixed version for Centos:7 p11-kit.
References
- https://access.redhat.com/security/cve/CVE-2020-29362
- https://www.debian.org/security/2021/dsa-4822
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
- https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
- https://access.redhat.com/errata/RHSA-2021:1609
medium severity
- Vulnerable module: p11-kit-trust
- Introduced through: p11-kit-trust@0.23.5-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › p11-kit-trust@0.23.5-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream p11-kit-trust package and not the p11-kit-trust package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
Remediation
There is no fixed version for Centos:7 p11-kit-trust.
References
- https://access.redhat.com/security/cve/CVE-2020-29362
- https://www.debian.org/security/2021/dsa-4822
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
- https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
- https://access.redhat.com/errata/RHSA-2021:1609
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2022-0391
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:6457
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://bugs.python.org/issue43882
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
- https://security.gentoo.org/glsa/202305-02
- https://security.netapp.com/advisory/ntap-20220225-0009/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.
Remediation
There is no fixed version for Centos:7 python.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/64194
- http://bugs.python.org/issue14621
- https://support.apple.com/kb/HT205031
- https://access.redhat.com/security/cve/CVE-2013-7040
- http://www.openwall.com/lists/oss-security/2013/12/09/13
- http://www.openwall.com/lists/oss-security/2013/12/09/3
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues.
This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet.
The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64 alphabet they are expecting or verify that their application would not be affected if the b64decode() functions accepted "+" or "/" outside of altchars.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-12781
- https://github.com/python/cpython/issues/125346
- https://github.com/python/cpython/pull/141128
- https://mail.python.org/archives/list/security-announce@python.org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/
- https://github.com/python/cpython/commit/13360efd385d1a7d0659beba03787ea3d063ef9b
- https://github.com/python/cpython/commit/1be80bec7960f5ccd059e75f3dfbd45fca302947
- https://github.com/python/cpython/commit/9060b4abbe475591b6230b23c2afefeff26fcca5
- https://github.com/python/cpython/commit/e95e783dff443b68e8179fdb57737025bf02ba76
- https://github.com/python/cpython/commit/fd17ee026fa9b67f6288cbafe374a3e479fe03a5
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2023-27043
- http://python.com
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- http://seclists.org/fulldisclosure/2025/Apr/8
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- http://python.org
- https://github.com/python/cpython/issues/102988
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
- https://security.netapp.com/advisory/ntap-20230601-0003/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-8088
- https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
- https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
- https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
- https://github.com/python/cpython/issues/122905
- https://github.com/python/cpython/pull/122906
- https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
- https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
- https://github.com/python/cpython/issues/123270
- https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
- https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
- https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
- https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
- https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
- https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
- https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
- http://www.openwall.com/lists/oss-security/2024/08/22/1
- http://www.openwall.com/lists/oss-security/2024/08/22/4
- http://www.openwall.com/lists/oss-security/2024/08/23/1
- http://www.openwall.com/lists/oss-security/2024/08/23/2
- https://security.netapp.com/advisory/ntap-20241011-0010/
- https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2021-4189
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:1986
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://bugs.python.org/issue43285
- https://bugzilla.redhat.com/show_bug.cgi?id=2036020
- https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://python-security.readthedocs.io/vuln/ftplib-pasv.html
- https://security-tracker.debian.org/tracker/CVE-2021-4189
- https://security.netapp.com/advisory/ntap-20221104-0004/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-0391
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:6457
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://bugs.python.org/issue43882
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
- https://security.gentoo.org/glsa/202305-02
- https://security.netapp.com/advisory/ntap-20220225-0009/
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/64194
- http://bugs.python.org/issue14621
- https://support.apple.com/kb/HT205031
- https://access.redhat.com/security/cve/CVE-2013-7040
- http://www.openwall.com/lists/oss-security/2013/12/09/13
- http://www.openwall.com/lists/oss-security/2013/12/09/3
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues.
This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet.
The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64 alphabet they are expecting or verify that their application would not be affected if the b64decode() functions accepted "+" or "/" outside of altchars.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-12781
- https://github.com/python/cpython/issues/125346
- https://github.com/python/cpython/pull/141128
- https://mail.python.org/archives/list/security-announce@python.org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/
- https://github.com/python/cpython/commit/13360efd385d1a7d0659beba03787ea3d063ef9b
- https://github.com/python/cpython/commit/1be80bec7960f5ccd059e75f3dfbd45fca302947
- https://github.com/python/cpython/commit/9060b4abbe475591b6230b23c2afefeff26fcca5
- https://github.com/python/cpython/commit/e95e783dff443b68e8179fdb57737025bf02ba76
- https://github.com/python/cpython/commit/fd17ee026fa9b67f6288cbafe374a3e479fe03a5
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-27043
- http://python.com
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- http://seclists.org/fulldisclosure/2025/Apr/8
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- http://python.org
- https://github.com/python/cpython/issues/102988
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
- https://security.netapp.com/advisory/ntap-20230601-0003/
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-8088
- https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
- https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
- https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
- https://github.com/python/cpython/issues/122905
- https://github.com/python/cpython/pull/122906
- https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
- https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
- https://github.com/python/cpython/issues/123270
- https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
- https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
- https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
- https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
- https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
- https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
- https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
- http://www.openwall.com/lists/oss-security/2024/08/22/1
- http://www.openwall.com/lists/oss-security/2024/08/22/4
- http://www.openwall.com/lists/oss-security/2024/08/23/1
- http://www.openwall.com/lists/oss-security/2024/08/23/2
- https://security.netapp.com/advisory/ntap-20241011-0010/
- https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-4189
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:1986
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://bugs.python.org/issue43285
- https://bugzilla.redhat.com/show_bug.cgi?id=2036020
- https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://python-security.readthedocs.io/vuln/ftplib-pasv.html
- https://security-tracker.debian.org/tracker/CVE-2021-4189
- https://security.netapp.com/advisory/ntap-20221104-0004/
medium severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://access.redhat.com/security/cve/CVE-2019-19924
- https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:1810
- https://usn.ubuntu.com/4298-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://support.apple.com/kb/HT211289
- https://access.redhat.com/security/cve/CVE-2019-20807
- http://seclists.org/fulldisclosure/2020/Jul/24
- https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
- https://github.com/vim/vim/releases/tag/v8.1.0881
- https://access.redhat.com/errata/RHSA-2020:4453
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
- https://usn.ubuntu.com/4582-1/
- https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
- https://www.starwindsoftware.com/security/sw-20220812-0003/
medium severity
- Vulnerable module: zlib
- Introduced through: zlib@1.2.7-18.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › zlib@1.2.7-18.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
Remediation
There is no fixed version for Centos:7 zlib.
References
- https://access.redhat.com/security/cve/CVE-2023-45853
- http://www.openwall.com/lists/oss-security/2023/10/20/9
- http://www.openwall.com/lists/oss-security/2024/01/24/10
- https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
- https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
- https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
- https://github.com/madler/zlib/pull/843
- https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
- https://pypi.org/project/pyminizip/#history
- https://security.gentoo.org/glsa/202401-18
- https://security.netapp.com/advisory/ntap-20231130-0009/
- https://www.winimage.com/zLibDll/minizip.html
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-58436
- https://github.com/OpenPrinting/cups/commit/40008d76a001babbb9beb9d9d74b01a86fb6ddb4
- https://github.com/OpenPrinting/cups/releases/tag/v2.4.15
- http://www.openwall.com/lists/oss-security/2025/11/27/4
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-8wpw-vfgm-qrrr
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://www.securityfocus.com/bid/67986
- http://advisories.mageia.org/MGASA-2014-0266.html
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
- https://bugs.freedesktop.org/show_bug.cgi?id=78979
- https://access.redhat.com/security/cve/CVE-2014-3477
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://seclists.org/oss-sec/2014/q2/509
- http://secunia.com/advisories/59428
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://www.securityfocus.com/bid/67986
- http://advisories.mageia.org/MGASA-2014-0266.html
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
- https://bugs.freedesktop.org/show_bug.cgi?id=78979
- https://access.redhat.com/security/cve/CVE-2014-3477
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://seclists.org/oss-sec/2014/q2/509
- http://secunia.com/advisories/59428
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2058
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2056
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2057
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://www.debian.org/security/2023/dsa-5333
medium severity
- Vulnerable module: mesa-libgbm
- Introduced through: mesa-libgbm@18.3.4-7.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › mesa-libgbm@18.3.4-7.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream mesa-libgbm package and not the mesa-libgbm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
Remediation
There is no fixed version for Centos:7 mesa-libgbm.
References
- https://access.redhat.com/security/cve/CVE-2019-5068
- https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
- https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
- https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
- https://usn.ubuntu.com/4271-1/
medium severity
- Vulnerable module: mesa-libglapi
- Introduced through: mesa-libglapi@18.3.4-7.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › mesa-libglapi@18.3.4-7.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream mesa-libglapi package and not the mesa-libglapi package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
Remediation
There is no fixed version for Centos:7 mesa-libglapi.
References
- https://access.redhat.com/security/cve/CVE-2019-5068
- https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
- https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
- https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
- https://usn.ubuntu.com/4271-1/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an issue in CPython when using bytes.decode("unicode_escape", error="ignore|replace"). If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-4516
- https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
- https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
- https://github.com/python/cpython/issues/133767
- https://github.com/python/cpython/pull/129648
- https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
- http://www.openwall.com/lists/oss-security/2025/05/16/4
- http://www.openwall.com/lists/oss-security/2025/05/19/1
- https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
- https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
- https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
- https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
- https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an issue in CPython when using bytes.decode("unicode_escape", error="ignore|replace"). If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-4516
- https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
- https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
- https://github.com/python/cpython/issues/133767
- https://github.com/python/cpython/pull/129648
- https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
- http://www.openwall.com/lists/oss-security/2025/05/16/4
- http://www.openwall.com/lists/oss-security/2025/05/19/1
- https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
- https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
- https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
- https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
- https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-27774
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- https://hackerone.com/reports/1543773
- https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-27774
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- https://hackerone.com/reports/1543773
- https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
Remediation
There is no fixed version for Centos:7 libssh2.
References
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://seclists.org/bugtraq/2019/Apr/25
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://access.redhat.com/security/cve/CVE-2019-3860
- https://www.debian.org/security/2019/dsa-4431
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://www.libssh2.org/CVE-2019-3860.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- http://www.securityfocus.com/bid/107485
- https://seclists.org/bugtraq/2019/Apr/25
- https://seclists.org/bugtraq/2019/Mar/25
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
- https://access.redhat.com/security/cve/CVE-2019-3859
- https://www.debian.org/security/2019/dsa-4431
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
- http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
- https://www.libssh2.org/CVE-2019-3859.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
- http://www.openwall.com/lists/oss-security/2019/03/18/3
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/91196
- https://access.redhat.com/security/cve/CVE-2016-5323
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/06/15/6
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/95837
- https://access.redhat.com/security/cve/CVE-2017-5601
- https://github.com/libarchive/libarchive/commit/98dcbbf0bf4854bf987557e55e55fff7abbf3ea9
- https://secunia.com/secunia_research/2017-3/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.securitytracker.com/id/1037974
medium severity
new
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers.
Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2025-4373
- https://bugzilla.redhat.com/show_bug.cgi?id=2364265
- https://access.redhat.com/errata/RHSA-2025:10855
- https://access.redhat.com/errata/RHSA-2025:11140
- https://access.redhat.com/errata/RHSA-2025:11327
- https://access.redhat.com/errata/RHSA-2025:11373
- https://access.redhat.com/errata/RHSA-2025:11374
- https://access.redhat.com/errata/RHSA-2025:11662
- https://gitlab.gnome.org/GNOME/glib/-/issues/3677
- https://access.redhat.com/errata/RHSA-2025:12275
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:14988
- https://access.redhat.com/errata/RHSA-2025:14989
- https://access.redhat.com/errata/RHSA-2025:14990
- https://access.redhat.com/errata/RHSA-2025:14991
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210205-0004/
- https://access.redhat.com/security/cve/CVE-2019-25013
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24973
- https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
- https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:0348
- https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
- https://security.gentoo.org/glsa/202107-07
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/84204
- https://sourceware.org/bugzilla/show_bug.cgi?id=19779
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
- https://access.redhat.com/security/cve/CVE-2016-1234
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- https://security.gentoo.org/glsa/201702-11
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/03/07/16
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-322.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-322.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20210205-0004/
- https://access.redhat.com/security/cve/CVE-2019-25013
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24973
- https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
- https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:0348
- https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
- https://security.gentoo.org/glsa/202107-07
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
- https://www.oracle.com/security-alerts/cpuapr2022.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/84204
- https://sourceware.org/bugzilla/show_bug.cgi?id=19779
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
- https://access.redhat.com/security/cve/CVE-2016-1234
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- https://security.gentoo.org/glsa/201702-11
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/03/07/16
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
medium severity
new
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk.
References
medium severity
new
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-devel.
References
medium severity
new
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Remediation
There is no fixed version for Centos:7 java-1.8.0-openjdk-headless.
References
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/95837
- https://access.redhat.com/security/cve/CVE-2017-5601
- https://github.com/libarchive/libarchive/commit/98dcbbf0bf4854bf987557e55e55fff7abbf3ea9
- https://secunia.com/secunia_research/2017-3/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.securitytracker.com/id/1037974
medium severity
new
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers.
Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in thepki_verify_data_signature function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value rc, which is initialized to SSH_ERROR and later rewritten to save the return value of the function call pki_key_check_hash_compatible. The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls goto error returning SSH_OK.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://access.redhat.com/security/cve/CVE-2023-2283
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/
- http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
- http://seclists.org/fulldisclosure/2025/Feb/18
- https://bugzilla.redhat.com/show_bug.cgi?id=2189736
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/
- https://security.gentoo.org/glsa/202312-05
- https://security.netapp.com/advisory/ntap-20240201-0005/
- https://www.libssh.org/security/advisories/CVE-2023-2283.txt
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-15282
- https://github.com/python/cpython/issues/143925
- https://github.com/python/cpython/pull/143926
- https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/
- https://github.com/python/cpython/commit/f25509e78e8be6ea73c811ac2b8c928c28841b9f
- https://github.com/python/cpython/commit/05356b1cc153108aaf27f3b72ce438af4aa218c0
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2026-0672
- https://github.com/python/cpython/issues/143919
- https://github.com/python/cpython/pull/143920
- https://mail.python.org/archives/list/security-announce@python.org/thread/6VFLQQEIX673KXKFUZXCUNE5AZOGZ45M/
- https://github.com/python/cpython/commit/95746b3a13a985787ef53b977129041971ed7f70
- https://github.com/python/cpython/commit/712452e6f1d4b9f7f8c4c92ebfcaac1705faa440
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-15282
- https://github.com/python/cpython/issues/143925
- https://github.com/python/cpython/pull/143926
- https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/
- https://github.com/python/cpython/commit/f25509e78e8be6ea73c811ac2b8c928c28841b9f
- https://github.com/python/cpython/commit/05356b1cc153108aaf27f3b72ce438af4aa218c0
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2026-0672
- https://github.com/python/cpython/issues/143919
- https://github.com/python/cpython/pull/143920
- https://mail.python.org/archives/list/security-announce@python.org/thread/6VFLQQEIX673KXKFUZXCUNE5AZOGZ45M/
- https://github.com/python/cpython/commit/95746b3a13a985787ef53b977129041971ed7f70
- https://github.com/python/cpython/commit/712452e6f1d4b9f7f8c4c92ebfcaac1705faa440
medium severity
- Vulnerable module: pam
- Introduced through: pam@1.1.8-23.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pam@1.1.8-23.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pam package and not the pam package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
Remediation
There is no fixed version for Centos:7 pam.
References
medium severity
- Vulnerable module: python-lxml
- Introduced through: python-lxml@3.2.1-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-lxml@3.2.1-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-lxml package and not the python-lxml package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
Remediation
There is no fixed version for Centos:7 python-lxml.
References
- https://access.redhat.com/security/cve/CVE-2018-19787
- https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
- https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
- https://usn.ubuntu.com/3841-1/
- https://usn.ubuntu.com/3841-2/
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2021-3421
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1927747
- https://access.redhat.com/errata/RHSA-2021:2574
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3421
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1927747
- https://access.redhat.com/errata/RHSA-2021:2574
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3421
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1927747
- https://access.redhat.com/errata/RHSA-2021:2574
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2021-3421
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://bugzilla.redhat.com/show_bug.cgi?id=1927747
- https://access.redhat.com/errata/RHSA-2021:2574
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.
A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://access.redhat.com/security/cve/CVE-2025-4598
- https://bugzilla.redhat.com/show_bug.cgi?id=2369242
- https://www.openwall.com/lists/oss-security/2025/05/29/3
- http://www.openwall.com/lists/oss-security/2025/06/05/1
- http://www.openwall.com/lists/oss-security/2025/06/05/3
- https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
- https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
- https://www.openwall.com/lists/oss-security/2025/08/18/3
- http://seclists.org/fulldisclosure/2025/Jun/9
- https://lists.debian.org/debian-lts-announce/2025/07/msg00022.html
- http://www.openwall.com/lists/oss-security/2025/08/18/3
- https://access.redhat.com/errata/RHSA-2025:22660
- https://access.redhat.com/errata/RHSA-2025:22868
- https://access.redhat.com/errata/RHSA-2025:23234
- https://access.redhat.com/errata/RHSA-2025:23227
- https://access.redhat.com/errata/RHSA-2026:0414
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.
A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-4598
- https://bugzilla.redhat.com/show_bug.cgi?id=2369242
- https://www.openwall.com/lists/oss-security/2025/05/29/3
- http://www.openwall.com/lists/oss-security/2025/06/05/1
- http://www.openwall.com/lists/oss-security/2025/06/05/3
- https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
- https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
- https://www.openwall.com/lists/oss-security/2025/08/18/3
- http://seclists.org/fulldisclosure/2025/Jun/9
- https://lists.debian.org/debian-lts-announce/2025/07/msg00022.html
- http://www.openwall.com/lists/oss-security/2025/08/18/3
- https://access.redhat.com/errata/RHSA-2025:22660
- https://access.redhat.com/errata/RHSA-2025:22868
- https://access.redhat.com/errata/RHSA-2025:23234
- https://access.redhat.com/errata/RHSA-2025:23227
- https://access.redhat.com/errata/RHSA-2026:0414
medium severity
new
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.
Remediation
There is no fixed version for Centos:7 tar.
References
- https://access.redhat.com/security/cve/CVE-2025-64118
- https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d
- https://github.com/isaacs/node-tar/issues/445
- https://github.com/isaacs/node-tar/pull/446
- https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph
medium severity
- Vulnerable module: libdb
- Introduced through: libdb@5.3.21-25.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libdb@5.3.21-25.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libdb package and not the libdb package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.
Remediation
There is no fixed version for Centos:7 libdb.
References
medium severity
- Vulnerable module: libdb-utils
- Introduced through: libdb-utils@5.3.21-25.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libdb-utils@5.3.21-25.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libdb-utils package and not the libdb-utils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.
Remediation
There is no fixed version for Centos:7 libdb-utils.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
- Fixed in: 0:4.0.3-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
Remediation
Upgrade Centos:7 libtiff to version 0:4.0.3-35.el7 or higher.
References
- https://seclists.org/bugtraq/2019/Nov/5
- https://seclists.org/bugtraq/2020/Jan/32
- https://gitlab.com/libtiff/libtiff/merge_requests/90
- https://access.redhat.com/security/cve/CVE-2019-14973
- https://www.debian.org/security/2020/dsa-4608
- https://www.debian.org/security/2020/dsa-4670
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/
- http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:3902
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
User-controlled header names and values containing newlines can allow injecting HTTP headers.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2026-0865
- https://github.com/python/cpython/issues/143916
- https://github.com/python/cpython/pull/143917
- https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/
- https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58
- https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510
- https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2
- https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5
- https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995
- https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211
medium severity
new
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-11468
- https://github.com/python/cpython/issues/143935
- https://github.com/python/cpython/pull/143936
- https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/
- https://github.com/python/cpython/commit/17d1490aa97bd6b98a42b1a9b324ead84e7fd8a2
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
User-controlled header names and values containing newlines can allow injecting HTTP headers.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2026-0865
- https://github.com/python/cpython/issues/143916
- https://github.com/python/cpython/pull/143917
- https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/
- https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58
- https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510
- https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2
- https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5
- https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995
- https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211
medium severity
new
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-11468
- https://github.com/python/cpython/issues/143935
- https://github.com/python/cpython/pull/143936
- https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/
- https://github.com/python/cpython/commit/17d1490aa97bd6b98a42b1a9b324ead84e7fd8a2
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
Remediation
There is no fixed version for Centos:7 systemd.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
- https://access.redhat.com/security/cve/CVE-2019-3842
- https://www.exploit-db.com/exploits/46743/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
- http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:1611
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
- https://access.redhat.com/security/cve/CVE-2019-3842
- https://www.exploit-db.com/exploits/46743/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
- http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://access.redhat.com/errata/RHSA-2021:1611
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
medium severity
- Vulnerable module: bzip2-libs
- Introduced through: bzip2-libs@1.0.6-13.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bzip2-libs@1.0.6-13.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bzip2-libs package and not the bzip2-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
Remediation
There is no fixed version for Centos:7 bzip2-libs.
References
- https://seclists.org/bugtraq/2019/Aug/4
- https://seclists.org/bugtraq/2019/Jul/22
- https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2019-12900
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
- http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
- http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
- https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
- https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
- https://usn.ubuntu.com/4038-1/
- https://usn.ubuntu.com/4038-2/
- https://usn.ubuntu.com/4146-1/
- https://usn.ubuntu.com/4146-2/
- https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
- https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
- https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS
medium severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.
Remediation
There is no fixed version for Centos:7 coreutils.
References
- https://access.redhat.com/security/cve/CVE-2025-5278
- https://bugzilla.redhat.com/show_bug.cgi?id=2368764
- http://www.openwall.com/lists/oss-security/2025/05/27/2
- http://www.openwall.com/lists/oss-security/2025/05/29/1
- https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14
- https://security-tracker.debian.org/tracker/CVE-2025-5278
- http://www.openwall.com/lists/oss-security/2025/05/29/2
- https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a FoomaticRIPCommandLine argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-35235
- http://www.openwall.com/lists/oss-security/2024/06/11/1
- http://www.openwall.com/lists/oss-security/2024/06/12/4
- http://www.openwall.com/lists/oss-security/2024/06/12/5
- http://www.openwall.com/lists/oss-security/2024/11/08/3
- https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
- https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
- https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
- https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- http://www.securityfocus.com/bid/96779
- https://access.redhat.com/security/cve/CVE-2017-6313
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
- https://security.gentoo.org/glsa/201709-08
- http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
- https://bugzilla.gnome.org/show_bug.cgi?id=779016
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- http://www.openwall.com/lists/oss-security/2017/02/21/4
- http://www.openwall.com/lists/oss-security/2017/02/26/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jpc_undo_roi function in libjasper/jpc/jpc_dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/95682
- https://access.redhat.com/security/cve/CVE-2017-5504
- https://security.gentoo.org/glsa/201908-03
- https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jpc_undo_roi-jpc_dec-c/
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
medium severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Remediation
There is no fixed version for Centos:7 libpng.
References
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-6829
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://access.redhat.com/errata/RHSA-2020:4076
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2020-12402
- https://www.debian.org/security/2020/dsa-4726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
- https://security.gentoo.org/glsa/202007-10
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://usn.ubuntu.com/4417-1/
- https://usn.ubuntu.com/4417-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
medium severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2021-3521
- https://access.redhat.com/errata/RHSA-2022:0368
- https://access.redhat.com/errata/RHSA-2022:0254
- https://access.redhat.com/errata/RHSA-2022:0634
- https://bugzilla.redhat.com/show_bug.cgi?id=1941098
- https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
- https://github.com/rpm-software-management/rpm/pull/1795/
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3521
- https://access.redhat.com/errata/RHSA-2022:0368
- https://access.redhat.com/errata/RHSA-2022:0254
- https://access.redhat.com/errata/RHSA-2022:0634
- https://bugzilla.redhat.com/show_bug.cgi?id=1941098
- https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
- https://github.com/rpm-software-management/rpm/pull/1795/
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3521
- https://access.redhat.com/errata/RHSA-2022:0368
- https://access.redhat.com/errata/RHSA-2022:0254
- https://access.redhat.com/errata/RHSA-2022:0634
- https://bugzilla.redhat.com/show_bug.cgi?id=1941098
- https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
- https://github.com/rpm-software-management/rpm/pull/1795/
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2021-3521
- https://access.redhat.com/errata/RHSA-2022:0368
- https://access.redhat.com/errata/RHSA-2022:0254
- https://access.redhat.com/errata/RHSA-2022:0634
- https://bugzilla.redhat.com/show_bug.cgi?id=1941098
- https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
- https://github.com/rpm-software-management/rpm/pull/1795/
- https://security.gentoo.org/glsa/202210-22
medium severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.
Remediation
There is no fixed version for Centos:7 systemd.
References
medium severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A security flaw has been discovered in vim up to 9.1.1615. Affected by this vulnerability is the function main of the file src/xxd/xxd.c of the component xxd. The manipulation results in buffer overflow. The attack requires a local approach. The exploit has been released to the public and may be exploited. Upgrading to version 9.1.1616 addresses this issue. The patch is identified as eeef7c77436a78cd27047b0f5fa6925d56de3cb0. It is recommended to upgrade the affected component.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2025-9390
- https://drive.google.com/file/d/1JLnqrdcGsjUhbYzIEweXIGZyETjHlKtX/view?usp=sharing
- https://github.com/vim/vim/commit/eeef7c77436a78cd27047b0f5fa6925d56de3cb0
- https://github.com/vim/vim/pull/17947
- https://github.com/vim/vim/releases/tag/v9.1.1616
- https://vuldb.com/?ctiid.321223
- https://vuldb.com/?id.321223
- https://github.com/vim/vim/issues/17944
- https://vuldb.com/?submit.630903
medium severity
- Vulnerable module: audit-libs
- Introduced through: audit-libs@2.8.5-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › audit-libs@2.8.5-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream audit-libs package and not the audit-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Audit before 2.4.4 in Linux does not sanitize escape characters in filenames.
Remediation
There is no fixed version for Centos:7 audit-libs.
References
medium severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
- Fixed in: 32:9.11.4-26.P2.el7_9.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
Remediation
Upgrade Centos:7 bind-license to version 32:9.11.4-26.P2.el7_9.2 or higher.
References
- https://kb.isc.org/docs/cve-2020-8624
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://access.redhat.com/security/cve/CVE-2020-8624
- https://www.debian.org/security/2020/dsa-4752
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
- https://security.gentoo.org/glsa/202008-19
- https://access.redhat.com/errata/RHSA-2020:5011
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
- https://usn.ubuntu.com/4468-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/74408
- http://curl.haxx.se/docs/adv_20150429.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://support.apple.com/kb/HT205031
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://access.redhat.com/security/cve/CVE-2015-3153
- http://www.debian.org/security/2015/dsa-3240
- http://www.securitytracker.com/id/1032233
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
- http://www.ubuntu.com/usn/USN-2591-1
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without Public Suffix Listawareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
Remediation
There is no fixed version for Centos:7 curl.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-27776
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
- https://hackerone.com/reports/1547048
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Remediation
There is no fixed version for Centos:7 expat.
References
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/91159
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2016-5300
- http://www.debian.org/security/2016/dsa-3597
- https://security.gentoo.org/glsa/201701-21
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/06/04/4
- http://www.openwall.com/lists/oss-security/2016/06/04/5
- http://www.ubuntu.com/usn/USN-3010-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/91483
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- https://access.redhat.com/security/cve/CVE-2012-6702
- http://www.debian.org/security/2016/dsa-3597
- https://security.gentoo.org/glsa/201701-21
- http://www.openwall.com/lists/oss-security/2016/06/03/8
- http://www.openwall.com/lists/oss-security/2016/06/04/1
- http://www.ubuntu.com/usn/USN-3010-1
medium severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/58233
- https://support.apple.com/kb/HT212804
- https://support.apple.com/kb/HT212805
- https://support.apple.com/kb/HT212807
- https://support.apple.com/kb/HT212814
- https://support.apple.com/kb/HT212815
- https://support.apple.com/kb/HT212819
- https://access.redhat.com/security/cve/CVE-2013-0340
- http://seclists.org/fulldisclosure/2021/Sep/33
- http://seclists.org/fulldisclosure/2021/Sep/34
- http://seclists.org/fulldisclosure/2021/Sep/35
- http://seclists.org/fulldisclosure/2021/Sep/38
- http://seclists.org/fulldisclosure/2021/Sep/39
- http://seclists.org/fulldisclosure/2021/Sep/40
- https://security.gentoo.org/glsa/201701-21
- http://openwall.com/lists/oss-security/2013/02/22/3
- https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
- http://www.openwall.com/lists/oss-security/2013/04/12/6
- http://www.openwall.com/lists/oss-security/2021/10/07/4
- http://www.osvdb.org/90634
- http://securitytracker.com/id?1028213
- https://github.com/libexpat/libexpat/blob/R_2_4_1/expat/Changes
- http://seclists.org/fulldisclosure/2021/Oct/61
- http://seclists.org/fulldisclosure/2021/Oct/62
- http://seclists.org/fulldisclosure/2021/Oct/63
- https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- http://www.securityfocus.com/bid/76953
- http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
- https://access.redhat.com/security/cve/CVE-2015-7673
- http://www.debian.org/security/2015/dsa-3378
- https://security.gentoo.org/glsa/201512-05
- http://www.openwall.com/lists/oss-security/2015/10/01/3
- http://www.openwall.com/lists/oss-security/2015/10/02/9
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
- http://www.ubuntu.com/usn/USN-2767-1
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple integer overflows in the (1) pixops_composite_nearest, (2) pixops_composite_color_nearest, and (3) pixops_process functions in pixops/pixops.c in gdk-pixbuf before 2.33.1 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22
- https://access.redhat.com/security/cve/CVE-2015-8875
- http://www.debian.org/security/2016/dsa-3589
- http://www.openwall.com/lists/oss-security/2016/05/12/3
- http://www.openwall.com/lists/oss-security/2016/05/16/1
- http://www.openwall.com/lists/oss-security/2016/05/17/7
- http://www.ubuntu.com/usn/USN-3085-1
medium severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- http://www.securityfocus.com/bid/76955
- http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
- https://access.redhat.com/security/cve/CVE-2015-7674
- http://www.debian.org/security/2015/dsa-3378
- https://security.gentoo.org/glsa/201512-05
- http://www.openwall.com/lists/oss-security/2015/10/01/4
- http://www.openwall.com/lists/oss-security/2015/10/01/7
- http://www.openwall.com/lists/oss-security/2015/10/02/10
- http://www.openwall.com/lists/oss-security/2015/10/05/7
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
- http://www.ubuntu.com/usn/USN-2767-1
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/82990
- https://bto.bluecoat.com/security-advisory/sa128
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-8391
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
- https://security.gentoo.org/glsa/201607-02
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1132
- https://access.redhat.com/errata/RHSA-2016:1025
- https://security.netapp.com/advisory/ntap-20230216-0002/
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/75430
- https://bugs.exim.org/show_bug.cgi?id=1651
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup
- http://vcs.pcre.org/pcre?view=revision&revision=1571
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-5073
- https://security.gentoo.org/glsa/201607-02
- http://www.openwall.com/lists/oss-security/2015/06/26/1
- http://www.openwall.com/lists/oss-security/2015/06/26/3
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1132
- https://access.redhat.com/errata/RHSA-2016:1025
- http://www.securitytracker.com/id/1033154
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/85576
- https://bto.bluecoat.com/security-advisory/sa128
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-8388
- https://security.gentoo.org/glsa/201607-02
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1132
- https://access.redhat.com/errata/RHSA-2016:1025
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/74924
- https://bugs.exim.org/show_bug.cgi?id=1515
- https://jira.mongodb.org/browse/SERVER-17252
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-2328
- http://www.fortiguard.com/advisory/FG-VD-15-014/
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1025
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/74924
- https://bugs.exim.org/show_bug.cgi?id=1503
- https://jira.mongodb.org/browse/SERVER-17252
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- https://access.redhat.com/security/cve/CVE-2015-2327
- http://www.fortiguard.com/advisory/FG-VD-15-010/
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHBA-2015:2142
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\.|([^\\W_])?)+)+$/.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/75018
- https://bugs.exim.org/show_bug.cgi?id=1638
- https://bugzilla.redhat.com/show_bug.cgi?id=1228283
- http://vcs.pcre.org/pcre?view=revision&revision=1566
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-3217
- http://www.openwall.com/lists/oss-security/2015/06/03/7
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1132
- https://access.redhat.com/errata/RHSA-2016:1025
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://www.securityfocus.com/bid/90687
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://access.redhat.com/security/cve/CVE-2015-2695
- http://www.debian.org/security/2015/dsa-3395
- https://security.gentoo.org/glsa/201611-14
- http://www.securitytracker.com/id/1034084
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
- http://www.ubuntu.com/usn/USN-2810-1
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://www.securityfocus.com/bid/90675
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
- https://access.redhat.com/security/cve/CVE-2015-2696
- http://www.debian.org/security/2015/dsa-3395
- https://security.gentoo.org/glsa/201611-14
- http://www.securitytracker.com/id/1034084
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
- http://www.ubuntu.com/usn/USN-2810-1
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://www.securityfocus.com/bid/77581
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
- https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://access.redhat.com/security/cve/CVE-2015-2697
- http://www.debian.org/security/2015/dsa-3395
- https://security.gentoo.org/glsa/201611-14
- http://www.securitytracker.com/id/1034084
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
- http://www.ubuntu.com/usn/USN-2810-1
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/74408
- http://curl.haxx.se/docs/adv_20150429.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://support.apple.com/kb/HT205031
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://access.redhat.com/security/cve/CVE-2015-3153
- http://www.debian.org/security/2015/dsa-3240
- http://www.securitytracker.com/id/1032233
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
- http://www.ubuntu.com/usn/USN-2591-1
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without Public Suffix Listawareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
Remediation
There is no fixed version for Centos:7 libcurl.
References
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-27776
- https://access.redhat.com/errata/RHSA-2022:5245
- https://access.redhat.com/errata/RHSA-2022:5313
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
- https://hackerone.com/reports/1547048
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://www.debian.org/security/2022/dsa-5197
medium severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
- https://access.redhat.com/security/cve/CVE-2016-4008
- http://www.debian.org/security/2016/dsa-3568
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
- https://security.gentoo.org/glsa/201703-05
- https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
- http://www.openwall.com/lists/oss-security/2016/04/11/3
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
- http://www.ubuntu.com/usn/USN-2957-1
- http://www.ubuntu.com/usn/USN-2957-2
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/90013
- https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
- https://www.tenable.com/security/tns-2016-18
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2016-4483
- http://www.debian.org/security/2016/dsa-3593
- https://security.gentoo.org/glsa/201701-37
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/05/03/8
- http://www.openwall.com/lists/oss-security/2016/05/04/7
- http://www.openwall.com/lists/oss-security/2016/06/07/4
- http://www.openwall.com/lists/oss-security/2016/06/07/5
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://www.securitytracker.com/id/1036348
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/90013
- https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
- https://www.tenable.com/security/tns-2016-18
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2016-4483
- http://www.debian.org/security/2016/dsa-3593
- https://security.gentoo.org/glsa/201701-37
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/05/03/8
- http://www.openwall.com/lists/oss-security/2016/05/04/7
- http://www.openwall.com/lists/oss-security/2016/06/07/4
- http://www.openwall.com/lists/oss-security/2016/06/07/5
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://www.securitytracker.com/id/1036348
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/90876
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1340017
- https://crbug.com/583171
- https://git.gnome.org/browse/libxslt/commit/?id=91d0540ac9beaa86719a05b749219a69baa0dd8d
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-1684
- http://www.debian.org/security/2016/dsa-3590
- http://www.debian.org/security/2016/dsa-3605
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- https://security.gentoo.org/glsa/201607-07
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.ubuntu.com/usn/USN-2992-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/90876
- http://www.securityfocus.com/bid/91826
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1340016
- https://crbug.com/583156
- https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-1683
- http://www.debian.org/security/2016/dsa-3590
- http://www.debian.org/security/2016/dsa-3605
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- https://security.gentoo.org/glsa/201607-07
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.ubuntu.com/usn/USN-2992-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4608, CVE-2016-4610, and CVE-2016-4612.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/91826
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-4609
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
- http://www.securitytracker.com/id/1036348
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4608, CVE-2016-4609, and CVE-2016-4612.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/91826
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-4610
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
- http://www.securitytracker.com/id/1036348
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, and CVE-2016-4612.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/91834
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-4607
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- http://www.securitytracker.com/id/1036348
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4609, CVE-2016-4610, and CVE-2016-4612.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://www.securityfocus.com/bid/91826
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://access.redhat.com/security/cve/CVE-2016-4608
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
- http://www.securitytracker.com/id/1036348
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.
Remediation
There is no fixed version for Centos:7 nss.
References
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Remediation
There is no fixed version for Centos:7 nss.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2808
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201512-10
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- https://access.redhat.com/errata/RHSA-2015:1006
- https://access.redhat.com/errata/RHSA-2015:1020
- https://access.redhat.com/errata/RHSA-2015:1021
- https://access.redhat.com/errata/RHSA-2015:1228
- https://access.redhat.com/errata/RHSA-2015:1229
- https://access.redhat.com/errata/RHSA-2015:1526
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2808
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201512-10
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- https://access.redhat.com/errata/RHSA-2015:1006
- https://access.redhat.com/errata/RHSA-2015:1020
- https://access.redhat.com/errata/RHSA-2015:1021
- https://access.redhat.com/errata/RHSA-2015:1228
- https://access.redhat.com/errata/RHSA-2015:1229
- https://access.redhat.com/errata/RHSA-2015:1526
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2808
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201512-10
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- https://access.redhat.com/errata/RHSA-2015:1006
- https://access.redhat.com/errata/RHSA-2015:1020
- https://access.redhat.com/errata/RHSA-2015:1021
- https://access.redhat.com/errata/RHSA-2015:1228
- https://access.redhat.com/errata/RHSA-2015:1229
- https://access.redhat.com/errata/RHSA-2015:1526
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://access.redhat.com/security/cve/CVE-2015-2808
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- https://security.gentoo.org/glsa/201512-10
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- https://access.redhat.com/errata/RHSA-2015:1006
- https://access.redhat.com/errata/RHSA-2015:1020
- https://access.redhat.com/errata/RHSA-2015:1021
- https://access.redhat.com/errata/RHSA-2015:1228
- https://access.redhat.com/errata/RHSA-2015:1229
- https://access.redhat.com/errata/RHSA-2015:1526
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.
Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-8291
- https://github.com/python/cpython/pull/139702
- https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
- https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
- https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
- https://github.com/python/cpython/issues/139700
- https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
- https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
- https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
- https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
- https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
- https://github.com/google/security-research/security/advisories/GHSA-hhv7-p4pg-wm6p
- https://github.com/psf/advisory-database/blob/main/advisories/python/PSF-2025-12.json
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-6069
- https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
- https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
- https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
- https://github.com/python/cpython/issues/135462
- https://github.com/python/cpython/pull/135464
- https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
- https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
- https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
- https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
- https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.
Remediation
There is no fixed version for Centos:7 python.
References
- http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
- http://bugs.python.org/issue17239
- https://bugs.launchpad.net/nova/+bug/1100282
- https://access.redhat.com/security/cve/CVE-2013-1664
- http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
- http://www.openwall.com/lists/oss-security/2013/02/19/2
- http://www.openwall.com/lists/oss-security/2013/02/19/4
- http://rhn.redhat.com/errata/RHSA-2013-0657.html
- http://rhn.redhat.com/errata/RHSA-2013-0658.html
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.
Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-8291
- https://github.com/python/cpython/pull/139702
- https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
- https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
- https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
- https://github.com/python/cpython/issues/139700
- https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
- https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
- https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
- https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
- https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
- https://github.com/google/security-research/security/advisories/GHSA-hhv7-p4pg-wm6p
- https://github.com/psf/advisory-database/blob/main/advisories/python/PSF-2025-12.json
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-6069
- https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
- https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
- https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
- https://github.com/python/cpython/issues/135462
- https://github.com/python/cpython/pull/135464
- https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
- https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
- https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
- https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
- https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
- http://bugs.python.org/issue17239
- https://bugs.launchpad.net/nova/+bug/1100282
- https://access.redhat.com/security/cve/CVE-2013-1664
- http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
- http://www.openwall.com/lists/oss-security/2013/02/19/2
- http://www.openwall.com/lists/oss-security/2013/02/19/4
- http://rhn.redhat.com/errata/RHSA-2013-0657.html
- http://rhn.redhat.com/errata/RHSA-2013-0658.html
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210528-0009/
- https://access.redhat.com/security/cve/CVE-2021-20197
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
- https://access.redhat.com/errata/RHSA-2021:4364
- https://security.gentoo.org/glsa/202208-30
medium severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.
Remediation
There is no fixed version for Centos:7 coreutils.
References
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
Remediation
There is no fixed version for Centos:7 glibc.
References
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14792
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14792
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14792
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
medium severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-5245
- https://sourceware.org/bugzilla/attachment.cgi?id=16004
- https://sourceware.org/bugzilla/show_bug.cgi?id=32829
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
- https://vuldb.com/?ctiid.310347
- https://vuldb.com/?id.310347
- https://vuldb.com/?submit.584635
- https://www.gnu.org/
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
medium severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0294.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80163
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://access.redhat.com/security/cve/CVE-2014-3532
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0294.html
- https://bugs.freedesktop.org/show_bug.cgi?id=79694
- https://bugs.freedesktop.org/show_bug.cgi?id=80469
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://access.redhat.com/security/cve/CVE-2014-3533
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0294.html
- https://bugs.freedesktop.org/show_bug.cgi?id=79694
- https://bugs.freedesktop.org/show_bug.cgi?id=80469
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://access.redhat.com/security/cve/CVE-2014-3533
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0294.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80163
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://access.redhat.com/security/cve/CVE-2014-3532
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.
Remediation
There is no fixed version for Centos:7 libarchive.
References
medium severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.
Remediation
There is no fixed version for Centos:7 libarchive.
References
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2024-34397
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
- https://gitlab.gnome.org/GNOME/glib/-/issues/3268
- https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
- https://security.netapp.com/advisory/ntap-20240531-0008/
- https://www.openwall.com/lists/oss-security/2024/05/07/5
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths case insensitively,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://security.netapp.com/advisory/ntap-20210902-0003/
- https://access.redhat.com/security/cve/CVE-2021-22924
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://hackerone.com/reports/1223565
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
- https://access.redhat.com/errata/RHSA-2021:3582
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://access.redhat.com/security/cve/CVE-2021-22876
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
- https://security.gentoo.org/glsa/202105-36
- https://curl.se/docs/CVE-2021-22876.html
- https://hackerone.com/reports/1101882
- https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the PWD command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit 415d2e7cb7, March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/101115
- https://curl.haxx.se/673d0cd8.patch
- https://curl.haxx.se/docs/adv_20171004.html
- https://support.apple.com/HT208331
- https://access.redhat.com/security/cve/CVE-2017-1000254
- http://www.debian.org/security/2017/dsa-3992
- https://security.gentoo.org/glsa/201712-04
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039509
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14779
- https://www.debian.org/security/2020/dsa-4779
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14781
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21248
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22049
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14782
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14797
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21619
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2 and 22; Oracle GraalVM Enterprise Edition: 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22045
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21624
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14779
- https://www.debian.org/security/2020/dsa-4779
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14781
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21248
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22049
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14782
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14797
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21619
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2 and 22; Oracle GraalVM Enterprise Edition: 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22045
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21624
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14779
- https://www.debian.org/security/2020/dsa-4779
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14781
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.322.b06-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.322.b06-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21248
- https://access.redhat.com/errata/RHSA-2022:0306
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
- https://security.gentoo.org/glsa/202209-05
- https://security.netapp.com/advisory/ntap-20220121-0007/
- https://www.debian.org/security/2022/dsa-5057
- https://www.debian.org/security/2022/dsa-5058
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22049
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14782
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14797
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21619
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2 and 22; Oracle GraalVM Enterprise Edition: 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.382.b05-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.382.b05-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2023-22045
- https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
- https://security.netapp.com/advisory/ntap-20230725-0006/
- https://www.debian.org/security/2023/dsa-5458
- https://www.debian.org/security/2023/dsa-5478
- https://www.oracle.com/security-alerts/cpujul2023.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.362.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.362.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.412.b08-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.412.b08-1.el7_9 or higher.
References
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.352.b08-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.352.b08-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2022-21624
- https://access.redhat.com/errata/RHSA-2022:7002
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
- https://security.netapp.com/advisory/ntap-20221028-0012/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202401-25
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths case insensitively,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://security.netapp.com/advisory/ntap-20210902-0003/
- https://access.redhat.com/security/cve/CVE-2021-22924
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://hackerone.com/reports/1223565
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
- https://access.redhat.com/errata/RHSA-2021:3582
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://access.redhat.com/security/cve/CVE-2021-22876
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
- https://security.gentoo.org/glsa/202105-36
- https://curl.se/docs/CVE-2021-22876.html
- https://hackerone.com/reports/1101882
- https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
- https://www.oracle.com//security-alerts/cpujul2021.html
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the PWD command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit 415d2e7cb7, March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/101115
- https://curl.haxx.se/673d0cd8.patch
- https://curl.haxx.se/docs/adv_20171004.html
- https://support.apple.com/HT208331
- https://access.redhat.com/security/cve/CVE-2017-1000254
- http://www.debian.org/security/2017/dsa-3992
- https://security.gentoo.org/glsa/201712-04
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039509
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
Remediation
There is no fixed version for Centos:7 nss.
References
- http://www.securityfocus.com/bid/94341
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://access.redhat.com/security/cve/CVE-2016-9074
- https://www.debian.org/security/2016/dsa-3730
- https://security.gentoo.org/glsa/201701-15
- https://security.gentoo.org/glsa/201701-46
- http://www.securitytracker.com/id/1037298
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
- http://www.securityfocus.com/bid/94341
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://access.redhat.com/security/cve/CVE-2016-9074
- https://www.debian.org/security/2016/dsa-3730
- https://security.gentoo.org/glsa/201701-15
- https://security.gentoo.org/glsa/201701-46
- http://www.securitytracker.com/id/1037298
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
- http://www.securityfocus.com/bid/94341
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://access.redhat.com/security/cve/CVE-2016-9074
- https://www.debian.org/security/2016/dsa-3730
- https://security.gentoo.org/glsa/201701-15
- https://security.gentoo.org/glsa/201701-46
- http://www.securitytracker.com/id/1037298
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
- Fixed in: 1:1.6.3-51.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
Remediation
Upgrade Centos:7 cups-libs to version 1:1.6.3-51.el7 or higher.
References
medium severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
- Fixed in: 1:1.6.3-51.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
Remediation
Upgrade Centos:7 cups-libs to version 1:1.6.3-51.el7 or higher.
References
medium severity
- Vulnerable module: nspr
- Introduced through: nspr@4.21.0-1.el7
- Fixed in: 0:4.25.0-2.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nspr@4.21.0-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nspr package and not the nspr package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nspr to version 0:4.25.0-2.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss-softokn to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
- Fixed in: 0:3.53.1-6.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss-softokn-freebl to version 0:3.53.1-6.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss-sysinit to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
- Fixed in: 0:3.53.1-3.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss-tools to version 0:3.53.1-3.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: nss-util
- Introduced through: nss-util@3.44.0-4.el7_7
- Fixed in: 0:3.53.1-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-util@3.44.0-4.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-util package and not the nss-util package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Remediation
Upgrade Centos:7 nss-util to version 0:3.53.1-1.el7_9 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-11727
- https://security.gentoo.org/glsa/201908-12
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://access.redhat.com/errata/RHSA-2020:4076
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via CURLOPT_USERNAME.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94097
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
- https://curl.haxx.se/CVE-2016-8617.patch
- https://curl.haxx.se/docs/adv_20161102C.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8617
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There are lots of memory leaks in JasPer 2.0.12, triggered in the function jas_strdup() in base/jas_string.c, that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://access.redhat.com/security/cve/CVE-2017-13748
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485287
- https://lists.debian.org/debian-lts-announce/2018/11/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via CURLOPT_USERNAME.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94097
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
- https://curl.haxx.se/CVE-2016-8617.patch
- https://curl.haxx.se/docs/adv_20161102C.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8617
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
medium severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2014-5270
- http://www.debian.org/security/2014/dsa-3024
- http://www.debian.org/security/2014/dsa-3073
- http://www.cs.tau.ac.il/~tromer/handsoff/
- http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html
- http://openwall.com/lists/oss-security/2014/08/16/2
medium severity
- Vulnerable module: libsepol
- Introduced through: libsepol@2.5-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libsepol@2.5-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol package and not the libsepol package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
Remediation
There is no fixed version for Centos:7 libsepol.
References
- https://access.redhat.com/security/cve/CVE-2021-36087
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
- https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac
- https://access.redhat.com/errata/RHSA-2021:4513
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
- https://security.netapp.com/advisory/ntap-20250207-0004/
- https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
- https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ%40mail.gmail.com/T/
medium severity
- Vulnerable module: libsepol
- Introduced through: libsepol@2.5-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libsepol@2.5-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol package and not the libsepol package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).
Remediation
There is no fixed version for Centos:7 libsepol.
References
- https://access.redhat.com/security/cve/CVE-2021-36084
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
- https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
- https://access.redhat.com/errata/RHSA-2021:4513
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://security.netapp.com/advisory/ntap-20250207-0004/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
medium severity
- Vulnerable module: libsepol
- Introduced through: libsepol@2.5-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libsepol@2.5-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol package and not the libsepol package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).
Remediation
There is no fixed version for Centos:7 libsepol.
References
- https://access.redhat.com/security/cve/CVE-2021-36086
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
- https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
- https://access.redhat.com/errata/RHSA-2021:4513
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://security.netapp.com/advisory/ntap-20250207-0004/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
medium severity
- Vulnerable module: libsepol
- Introduced through: libsepol@2.5-10.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libsepol@2.5-10.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol package and not the libsepol package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).
Remediation
There is no fixed version for Centos:7 libsepol.
References
- https://access.redhat.com/security/cve/CVE-2021-36085
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
- https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
- https://access.redhat.com/errata/RHSA-2021:4513
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://security.netapp.com/advisory/ntap-20250207-0004/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds read in readContigTilesIntoBuffer(). Reported as MSVR 35092.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.
Remediation
There is no fixed version for Centos:7 libtiff.
References
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://security.netapp.com/advisory/ntap-20210122-0007/
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://access.redhat.com/security/cve/CVE-2020-8284
- https://www.debian.org/security/2021/dsa-4881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://security.gentoo.org/glsa/202012-14
- https://curl.se/docs/CVE-2020-8284.html
- https://hackerone.com/reports/1040166
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/102057
- https://curl.haxx.se/docs/adv_2017-ae72.html
- http://security.cucumberlinux.com/security/details.php?id=162
- https://access.redhat.com/security/cve/CVE-2017-8817
- https://www.debian.org/security/2017/dsa-4051
- https://security.gentoo.org/glsa/201712-04
- https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039897
medium severity
- Vulnerable module: java-1.8.0-openjdk
- Introduced through: java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk package and not the java-1.8.0-openjdk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14796
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-devel
- Introduced through: java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-devel@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-devel package and not the java-1.8.0-openjdk-devel package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-devel to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14796
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: java-1.8.0-openjdk-headless
- Introduced through: java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
- Fixed in: 1:1.8.0.272.b10-1.el7_9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › java-1.8.0-openjdk-headless@1:1.8.0.262.b10-0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-headless package and not the java-1.8.0-openjdk-headless package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Remediation
Upgrade Centos:7 java-1.8.0-openjdk-headless to version 1:1.8.0.272.b10-1.el7_9 or higher.
References
- https://security.netapp.com/advisory/ntap-20201023-0004/
- https://access.redhat.com/security/cve/CVE-2020-14796
- https://www.debian.org/security/2020/dsa-4779
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
- https://access.redhat.com/errata/RHSA-2020:4350
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://www.securityfocus.com/bid/70380
- http://advisories.mageia.org/MGASA-2014-0477.html
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
- https://bugzilla.redhat.com/show_bug.cgi?id=1145425
- https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
- https://access.redhat.com/security/cve/CVE-2014-5351
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
- http://security.gentoo.org/glsa/glsa-201412-53.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
- http://www.securitytracker.com/id/1031003
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
- http://www.ubuntu.com/usn/USN-2498-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://security.netapp.com/advisory/ntap-20210122-0007/
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://access.redhat.com/security/cve/CVE-2020-8284
- https://www.debian.org/security/2021/dsa-4881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://security.gentoo.org/glsa/202012-14
- https://curl.se/docs/CVE-2020-8284.html
- https://hackerone.com/reports/1040166
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
medium severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/102057
- https://curl.haxx.se/docs/adv_2017-ae72.html
- http://security.cucumberlinux.com/security/details.php?id=162
- https://access.redhat.com/security/cve/CVE-2017-8817
- https://www.debian.org/security/2017/dsa-4051
- https://security.gentoo.org/glsa/201712-04
- https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039897
medium severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
medium severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
medium severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.
Remediation
There is no fixed version for Centos:7 python.
References
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.
Remediation
There is no fixed version for Centos:7 python-libs.
References
low severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
Remediation
There is no fixed version for Centos:7 expat.
References
- http://www.securityfocus.com/bid/94337
- https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://access.redhat.com/security/cve/CVE-2016-9063
- https://www.debian.org/security/2017/dsa-3898
- http://www.securitytracker.com/id/1037298
- http://www.securitytracker.com/id/1039427
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: ca-certificates
- Introduced through: ca-certificates@2020.2.41-70.0.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ca-certificates@2020.2.41-70.0.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream ca-certificates package and not the ca-certificates package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
Remediation
There is no fixed version for Centos:7 ca-certificates.
References
- https://access.redhat.com/security/cve/CVE-2023-37920
- https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909
- https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7
- https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/
- https://security.netapp.com/advisory/ntap-20240912-0002/
low severity
- Vulnerable module: graphite2
- Introduced through: graphite2@1.3.10-1.el7_3
Detailed paths
-
Introduced through: jboss/base-jdk@8 › graphite2@1.3.10-1.el7_3
NVD Description
Note: Versions mentioned in the description apply only to the upstream graphite2 package and not the graphite2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
Remediation
There is no fixed version for Centos:7 graphite2.
References
- https://access.redhat.com/security/cve/CVE-2018-7999
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/
- https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6
- https://github.com/silnrsi/graphite/issues/22
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2024-22667
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/
- https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt
- https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/
- https://security.netapp.com/advisory/ntap-20240223-0008/
low severity
- Vulnerable module: bash
- Introduced through: bash@4.2.46-34.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bash@4.2.46-34.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bash package and not the bash package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
Remediation
There is no fixed version for Centos:7 bash.
References
- https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
- https://security.netapp.com/advisory/ntap-20200430-0003/
- https://access.redhat.com/security/cve/CVE-2019-18276
- https://security.gentoo.org/glsa/202105-34
- http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
- https://www.youtube.com/watch?v=-wGtxJ8opa8
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1679
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.exploit-db.com/exploits/47726
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap buffer overflow vulnerability in binutils readelf before 2.40 via function find_section_in_set in file readelf.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- http://www.securityfocus.com/bid/98641
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
- https://access.redhat.com/security/cve/CVE-2017-6891
- http://www.debian.org/security/2017/dsa-3861
- https://security.gentoo.org/glsa/201710-11
- https://secuniaresearch.flexerasoftware.com/advisories/76125/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.securitytracker.com/id/1038619
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2124
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
- https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
- https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2175
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e
- https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0512
- https://www.cve.org/CVERecord?id=CVE-2023-0512
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- http://seclists.org/fulldisclosure/2023/Mar/17
- http://seclists.org/fulldisclosure/2023/Mar/18
- http://seclists.org/fulldisclosure/2023/Mar/21
- https://github.com/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835
- https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://support.apple.com/kb/HT213670
- https://support.apple.com/kb/HT213675
- https://support.apple.com/kb/HT213677
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2125
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
- https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2182
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e
- https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2207
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b
- https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2284
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
- https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2344
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
- https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2343
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
- https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2819
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c988889
- https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0433
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
- http://seclists.org/fulldisclosure/2023/Mar/17
- http://seclists.org/fulldisclosure/2023/Mar/18
- http://seclists.org/fulldisclosure/2023/Mar/21
- https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b
- https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
- https://support.apple.com/kb/HT213670
- https://support.apple.com/kb/HT213675
- https://support.apple.com/kb/HT213677
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2285
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
- https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-1619
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
- https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
- https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://security.netapp.com/advisory/ntap-20220930-0007/
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2126
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
- https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
- https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2206
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908
- https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2286
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
- https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2816
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666
- https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0051
- http://seclists.org/fulldisclosure/2023/Mar/17
- https://github.com/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4
- https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213670
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2129
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
- https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2210
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa
- https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3234
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d
- https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3296
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://github.com/vim/vim/commit/96b9bf8f74af8abf1e30054f996708db7dc285be
- https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0054
- http://seclists.org/fulldisclosure/2023/Mar/17
- https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731
- https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d
- https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213670
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-1154
- https://access.redhat.com/errata/RHSA-2022:1552
- https://access.redhat.com/errata/RHSA-2022:5242
- https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
- https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
- https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
- https://security.gentoo.org/glsa/202208-32
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://security.gentoo.org/glsa/202305-16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0046.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2345
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
- https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0213.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2817
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20
- https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0225.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2889
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://github.com/vim/vim/commit/91c7cbfe31bbef57d5fcf7d76989fc159f73ef15
- https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0246.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2946
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://github.com/vim/vim/commit/adce965162dd89bf29ee0e5baf53652e7515762c
- https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0221.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2862
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494
- https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0322.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3037
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RY3GEN2Q46ZJKSNHTN2XB6B3VAJBEILN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHJ6LCLHGGVI2U6ZHXHTZ2PYP4STC23N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb
- https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RY3GEN2Q46ZJKSNHTN2XB6B3VAJBEILN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHJ6LCLHGGVI2U6ZHXHTZ2PYP4STC23N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0490.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3235
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0
- https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0614.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3352
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://github.com/vim/vim/commit/ef976323e770315b5fca544efb6b2faa25674d15
- https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0530.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3256
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://github.com/vim/vim/commit/8ecfa2c56b4992c7f067b92488aa9acea5a454ad
- https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3
- https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0882.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-4292
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
- https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93
- https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
- https://security.gentoo.org/glsa/202305-16
- https://security.netapp.com/advisory/ntap-20230113-0005/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.0789.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
CUPS is a standards-based, open-source printing system, and libppd can be used for legacy PPD file support. The libppd function ppdCreatePPDFromIPP2 does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as cfGetPrinterAttributes5, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-47175
- https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
- https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
- https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
- https://www.cups.org
- https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
- http://www.openwall.com/lists/oss-security/2024/09/27/3
- https://github.com/OpenPrinting/libppd/commit/d681747ebf12602cb426725eb8ce2753211e2477
- https://lists.debian.org/debian-lts-announce/2024/09/msg00047.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0016
- https://security.netapp.com/advisory/ntap-20241011-0001/
low severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
Remediation
There is no fixed version for Centos:7 libpng.
References
- http://www.securityfocus.com/bid/80592
- http://sourceforge.net/p/libpng/bugs/244/
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2015-8540
- http://www.debian.org/security/2016/dsa-3443
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
- https://security.gentoo.org/glsa/201611-08
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2015/12/10/6
- http://www.openwall.com/lists/oss-security/2015/12/10/7
- http://www.openwall.com/lists/oss-security/2015/12/11/1
- http://www.openwall.com/lists/oss-security/2015/12/11/2
- http://www.openwall.com/lists/oss-security/2015/12/17/10
- https://access.redhat.com/errata/RHSA-2016:1430
- https://access.redhat.com/errata/RHSA-2016:0099
- https://access.redhat.com/errata/RHSA-2016:0101
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2021-3826
- https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
- https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl provides the CURLOPT_CERTINFO option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-27781
- https://hackerone.com/reports/1555441
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://www.debian.org/security/2022/dsa-5197
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2018-16429
- https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
- https://gitlab.gnome.org/GNOME/glib/issues/1361
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
- https://usn.ubuntu.com/3767-1/
- https://usn.ubuntu.com/3767-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl provides the CURLOPT_CERTINFO option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-27781
- https://hackerone.com/reports/1555441
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://www.debian.org/security/2022/dsa-5197
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://access.redhat.com/security/cve/CVE-2021-3826
- https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
- https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://access.redhat.com/security/cve/CVE-2021-3826
- https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
- https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decryption initialisation function will match the NULL cipher as being equivalent and will fetch this from the available providers. This will succeed if the default provider has been loaded (or if a third party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext. Applications are only affected by this issue if they call EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an encryption/decryption initialisation function. Applications that only use SSL/TLS are not impacted by this issue. Fixed in OpenSSL 3.0.6 (Affected 3.0.0-3.0.5).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-3358
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023
- https://security.netapp.com/advisory/ntap-20221028-0014/
- https://www.openssl.org/news/secadv/20221011.txt
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
Remediation
There is no fixed version for Centos:7 sqlite.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.
Remediation
There is no fixed version for Centos:7 sqlite.
References
low severity
- Vulnerable module: libcom_err
- Introduced through: libcom_err@1.42.9-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcom_err@1.42.9-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
Remediation
There is no fixed version for Centos:7 libcom_err.
References
- http://www.securityfocus.com/bid/72709
- http://advisories.mageia.org/MGASA-2015-0088.html
- https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
- https://access.redhat.com/security/cve/CVE-2015-1572
- http://www.debian.org/security/2015/dsa-3166
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
- https://security.gentoo.org/glsa/201507-22
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
- http://www.ubuntu.com/usn/USN-2507-1
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-51257
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/
- https://github.com/jasper-software/jasper/issues/367
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Divide By Zero in GitHub repository vim/vim prior to 9.0.1367.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-1127
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/
- https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c
- https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0288
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
- http://seclists.org/fulldisclosure/2023/Mar/17
- https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a
- https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
- https://support.apple.com/kb/HT213670
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- https://access.redhat.com/security/cve/CVE-2021-3927
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
- https://security.gentoo.org/glsa/202208-32
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-0049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/
- http://seclists.org/fulldisclosure/2023/Mar/17
- https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c
- https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/
- https://security.gentoo.org/glsa/202305-16
- https://security.netapp.com/advisory/ntap-20250117-0005/
- https://support.apple.com/kb/HT213670
low severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://access.redhat.com/security/cve/CVE-2023-2953
- http://seclists.org/fulldisclosure/2023/Jul/47
- http://seclists.org/fulldisclosure/2023/Jul/48
- http://seclists.org/fulldisclosure/2023/Jul/52
- https://bugs.openldap.org/show_bug.cgi?id=9904
- https://security.netapp.com/advisory/ntap-20230703-0005/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Out-of-bounds Read
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- https://access.redhat.com/security/cve/CVE-2021-4166
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- http://seclists.org/fulldisclosure/2022/Jul/14
- http://seclists.org/fulldisclosure/2022/Mar/29
- http://seclists.org/fulldisclosure/2022/May/35
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
- https://security.gentoo.org/glsa/202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2287
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
- https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
Remediation
There is no fixed version for Centos:7 dbus.
References
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
Remediation
There is no fixed version for Centos:7 unzip.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-3705
- http://seclists.org/fulldisclosure/2023/Jan/19
- https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
- https://security.netapp.com/advisory/ntap-20221223-0004/
- https://support.apple.com/kb/HT213605
- https://vuldb.com/?id.212324
- https://security.gentoo.org/glsa/202305-16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-0351
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
- https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
- https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://security.gentoo.org/glsa/202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
Remediation
There is no fixed version for Centos:7 bind-license.
References
- http://www.securityfocus.com/bid/91611
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://access.redhat.com/security/cve/CVE-2016-6170
- https://security.gentoo.org/glsa/201610-07
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
- http://www.openwall.com/lists/oss-security/2016/07/06/3
- http://www.securitytracker.com/id/1036241
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2023-32611
- https://bugzilla.redhat.com/show_bug.cgi?id=2211829
- https://gitlab.gnome.org/GNOME/glib/-/issues/2797
- https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
- https://security.gentoo.org/glsa/202311-18
- https://security.netapp.com/advisory/ntap-20231027-0005/
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2023-32665
- https://bugzilla.redhat.com/show_bug.cgi?id=2211827
- https://gitlab.gnome.org/GNOME/glib/-/issues/2121
- https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
- https://security.gentoo.org/glsa/202311-18
- https://security.netapp.com/advisory/ntap-20240426-0006/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2520
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://bugzilla.redhat.com/show_bug.cgi?id=2122792
- https://gitlab.com/libtiff/libtiff/-/issues/424
- https://gitlab.com/libtiff/libtiff/-/merge_requests/378
- https://www.debian.org/security/2023/dsa-5333
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-2521
- https://access.redhat.com/errata/RHSA-2023:0095
- https://access.redhat.com/errata/RHSA-2023:0302
- https://bugzilla.redhat.com/show_bug.cgi?id=2122799
- https://gitlab.com/libtiff/libtiff/-/issues/422
- https://gitlab.com/libtiff/libtiff/-/merge_requests/378
- https://www.debian.org/security/2023/dsa-5333
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19190
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19187
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19189
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
- https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19185
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19186
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2023-50495
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
- https://security.netapp.com/advisory/ntap-20240119-0008/
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2020-19188
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19190
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19187
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19189
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
- https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19185
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19186
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2023-50495
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
- https://security.netapp.com/advisory/ntap-20240119-0008/
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2020-19188
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19190
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19187
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19189
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
- https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19185
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19186
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-50495
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
- https://security.netapp.com/advisory/ntap-20240119-0008/
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2020-19188
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
- https://security.netapp.com/advisory/ntap-20231006-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.
Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences.
The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions.
The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service.
The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-6129
- http://www.openwall.com/lists/oss-security/2024/01/09/1
- http://www.openwall.com/lists/oss-security/2024/03/11/1
- https://security.netapp.com/advisory/ntap-20240216-0009/
- https://security.netapp.com/advisory/ntap-20240426-0008/
- https://security.netapp.com/advisory/ntap-20240426-0013/
- https://security.netapp.com/advisory/ntap-20240503-0011/
- https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
- https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
- https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
- https://www.openssl.org/news/secadv/20240109.txt
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2021-3737
- https://access.redhat.com/errata/RHSA-2021:4160
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:1986
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://bugs.python.org/issue44022
- https://bugzilla.redhat.com/show_bug.cgi?id=1995162
- https://github.com/python/cpython/pull/25916
- https://github.com/python/cpython/pull/26503
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
- https://security.netapp.com/advisory/ntap-20220407-0009/
- https://ubuntu.com/security/CVE-2021-3737
- https://www.oracle.com/security-alerts/cpujul2022.html
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-3737
- https://access.redhat.com/errata/RHSA-2021:4160
- https://access.redhat.com/errata/RHSA-2022:1764
- https://access.redhat.com/errata/RHSA-2022:1821
- https://access.redhat.com/errata/RHSA-2022:1986
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://bugs.python.org/issue44022
- https://bugzilla.redhat.com/show_bug.cgi?id=1995162
- https://github.com/python/cpython/pull/25916
- https://github.com/python/cpython/pull/26503
- https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
- https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
- https://security.netapp.com/advisory/ntap-20220407-0009/
- https://ubuntu.com/security/CVE-2021-3737
- https://www.oracle.com/security-alerts/cpujul2022.html
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://access.redhat.com/security/cve/CVE-2023-29499
- https://bugzilla.redhat.com/show_bug.cgi?id=2211828
- https://gitlab.gnome.org/GNOME/glib/-/issues/2794
- https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
- https://security.gentoo.org/glsa/202311-18
- https://security.netapp.com/advisory/ntap-20231103-0001/
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
Remediation
There is no fixed version for Centos:7 glib2.
References
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://access.redhat.com/security/cve/CVE-2020-35494
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911439
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
low severity
- Vulnerable module: gawk
- Introduced through: gawk@4.0.2-4.el7_3.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gawk@4.0.2-4.el7_3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream gawk package and not the gawk package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
Remediation
There is no fixed version for Centos:7 gawk.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0891
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
- https://gitlab.com/libtiff/libtiff/-/issues/380
- https://gitlab.com/libtiff/libtiff/-/issues/382
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://www.debian.org/security/2022/dsa-5108
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-1720
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
- https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
- https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2022-36227
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/
- https://bugs.gentoo.org/882521
- https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215
- https://github.com/libarchive/libarchive/issues/1754
- https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/
- https://security.gentoo.org/glsa/202309-14
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/95019
- https://curl.haxx.se/docs/adv_20161221A.html
- https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-9586
- https://security.gentoo.org/glsa/201701-47
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037515
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When asked to both use a .netrc file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2024-11053
- https://curl.se/docs/CVE-2024-11053.html
- https://curl.se/docs/CVE-2024-11053.json
- https://hackerone.com/reports/2829063
- http://www.openwall.com/lists/oss-security/2024/12/11/1
- https://security.netapp.com/advisory/ntap-20250124-0012/
- https://security.netapp.com/advisory/ntap-20250131-0003/
- https://security.netapp.com/advisory/ntap-20250131-0004/
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7_9.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
Remediation
Upgrade Centos:7 curl to version 0:7.29.0-59.el7_9.2 or higher.
References
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://security.netapp.com/advisory/ntap-20210629-0005/
- https://access.redhat.com/security/cve/CVE-2021-33574
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
- https://security.gentoo.org/glsa/202107-07
- https://sourceware.org/bugzilla/show_bug.cgi?id=27896
- https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
- https://access.redhat.com/errata/RHSA-2021:4358
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
low severity
new
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
Remediation
There is no fixed version for Centos:7 glibc.
References
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://security.netapp.com/advisory/ntap-20210629-0005/
- https://access.redhat.com/security/cve/CVE-2021-33574
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
- https://security.gentoo.org/glsa/202107-07
- https://sourceware.org/bugzilla/show_bug.cgi?id=27896
- https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
- https://access.redhat.com/errata/RHSA-2021:4358
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
low severity
new
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
low severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
low severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2022-36227
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/
- https://bugs.gentoo.org/882521
- https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215
- https://github.com/libarchive/libarchive/issues/1754
- https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/
- https://security.gentoo.org/glsa/202309-14
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/95019
- https://curl.haxx.se/docs/adv_20161221A.html
- https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-9586
- https://security.gentoo.org/glsa/201701-47
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037515
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When asked to both use a .netrc file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2024-11053
- https://curl.se/docs/CVE-2024-11053.html
- https://curl.se/docs/CVE-2024-11053.json
- https://hackerone.com/reports/2829063
- http://www.openwall.com/lists/oss-security/2024/12/11/1
- https://security.netapp.com/advisory/ntap-20250124-0012/
- https://security.netapp.com/advisory/ntap-20250131-0003/
- https://security.netapp.com/advisory/ntap-20250131-0004/
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
- Fixed in: 0:7.29.0-59.el7_9.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
Remediation
Upgrade Centos:7 libcurl to version 0:7.29.0-59.el7_9.2 or higher.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
new
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."
Remediation
There is no fixed version for Centos:7 libxml2.
References
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
low severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
Remediation
There is no fixed version for Centos:7 nss.
References
low severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
low severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://security.netapp.com/advisory/ntap-20200911-0004/
- https://www.openssl.org/news/secadv/20200909.txt
- https://access.redhat.com/security/cve/CVE-2020-1968
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://usn.ubuntu.com/4504-1/
- https://security.gentoo.org/glsa/202210-02
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.
Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.
The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).
This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a "no overlap" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.
In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.
This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-5535
- http://www.openwall.com/lists/oss-security/2024/08/15/1
- http://www.openwall.com/lists/oss-security/2024/06/27/1
- http://www.openwall.com/lists/oss-security/2024/06/28/4
- https://security.netapp.com/advisory/ntap-20240712-0005/
- https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37
- https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e
- https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c
- https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c
- https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c
- https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87
- https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html
- https://security.netapp.com/advisory/ntap-20241025-0006/
- https://security.netapp.com/advisory/ntap-20241025-0010/
- https://www.openssl.org/news/secadv/20240627.txt
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-0464
- https://security.netapp.com/advisory/ntap-20230406-0006/
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.couchbase.com/alerts/
- https://www.debian.org/security/2023/dsa-5417
- https://www.openssl.org/news/secadv/20230322.txt
low severity
- Vulnerable module: file-libs
- Introduced through: file-libs@5.11-36.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › file-libs@5.11-36.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream file-libs package and not the file-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
Remediation
There is no fixed version for Centos:7 file-libs.
References
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- http://www.securityfocus.com/bid/85802
- http://bugs.gw.com/view.php?id=522
- http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
- https://bugs.php.net/bug.php?id=71527
- https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://support.apple.com/HT206567
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-7.php
- https://access.redhat.com/security/cve/CVE-2015-8865
- http://www.debian.org/security/2016/dsa-3560
- https://security.gentoo.org/glsa/201611-22
- https://security.gentoo.org/glsa/201701-42
- http://www.openwall.com/lists/oss-security/2016/04/24/1
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
- https://usn.ubuntu.com/3686-1/
- https://usn.ubuntu.com/3686-2/
- http://www.ubuntu.com/usn/USN-2952-1
- http://www.ubuntu.com/usn/USN-2952-2
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fe13566c93f118a15a96320a546c7878fd0cfc5e
low severity
- Vulnerable module: gpgme
- Introduced through: gpgme@1.3.2-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gpgme@1.3.2-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gpgme package and not the gpgme package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
Remediation
There is no fixed version for Centos:7 gpgme.
References
- http://www.securityfocus.com/bid/68990
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
- https://bugzilla.redhat.com/show_bug.cgi?id=1113267
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- https://access.redhat.com/security/cve/CVE-2014-3564
- http://www.debian.org/security/2014/dsa-3005
- http://seclists.org/oss-sec/2014/q3/266
- http://www.osvdb.org/109699
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2018-17985
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2022-38533
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://security.gentoo.org/glsa/202309-15
- https://security.netapp.com/advisory/ntap-20221104-0007/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
- https://sourceware.org/bugzilla/show_bug.cgi?id=29495
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/103030
- https://sourceware.org/bugzilla/show_bug.cgi?id=22794
- https://access.redhat.com/security/cve/CVE-2018-6759
- https://security.gentoo.org/glsa/201811-17
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://access.redhat.com/security/cve/CVE-2020-35493
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911437
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://access.redhat.com/security/cve/CVE-2020-16593
- https://sourceware.org/bugzilla/show_bug.cgi?id=25827
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=aec72fda3b320c36eb99fc1c4cf95b10fc026729
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://access.redhat.com/security/cve/CVE-2020-16599
- https://sourceware.org/bugzilla/show_bug.cgi?id=25842
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://access.redhat.com/security/cve/CVE-2020-35495
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911441
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://access.redhat.com/security/cve/CVE-2020-35496
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911444
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/108903
- https://access.redhat.com/security/cve/CVE-2019-12972
- https://security.gentoo.org/glsa/202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://access.redhat.com/security/cve/CVE-2020-16591
- https://sourceware.org/bugzilla/show_bug.cgi?id=25822
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=001890e1f9269697f7e0212430a51479271bdab2
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered function make_tempdir, and make_tempname in bucomm.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered function pr_function_type in prdbg.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered function parse_stab_struct_fields in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://access.redhat.com/security/cve/CVE-2019-17450
- https://security.gentoo.org/glsa/202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- https://access.redhat.com/errata/RHSA-2020:4465
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3
- https://github.com/apple/cups/issues/5143
- https://github.com/apple/cups/releases/tag/v2.2.6
- https://access.redhat.com/security/cve/CVE-2017-18248
- https://security.cucumberlinux.com/security/details.php?id=346
- https://lists.debian.org/debian-lts-announce/2018/05/msg00018.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html
- https://usn.ubuntu.com/3713-1/
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/106358
- https://security.netapp.com/advisory/ntap-20190321-0002/
- https://access.redhat.com/security/cve/CVE-2018-20483
- https://security.gentoo.org/glsa/201903-08
- http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
- https://twitter.com/marcan42/status/1077676739877232640
- https://access.redhat.com/errata/RHSA-2019:3701
- https://usn.ubuntu.com/3943-1/
low severity
- Vulnerable module: file-libs
- Introduced through: file-libs@5.11-36.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › file-libs@5.11-36.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream file-libs package and not the file-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
Remediation
There is no fixed version for Centos:7 file-libs.
References
- https://access.redhat.com/security/cve/CVE-2022-48554
- http://seclists.org/fulldisclosure/2024/Mar/21
- http://seclists.org/fulldisclosure/2024/Mar/24
- http://seclists.org/fulldisclosure/2024/Mar/25
- https://bugs.astron.com/view.php?id=310
- https://security.netapp.com/advisory/ntap-20231116-0002/
- https://support.apple.com/kb/HT214081
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214086
- https://support.apple.com/kb/HT214088
- https://www.debian.org/security/2023/dsa-5489
low severity
- Vulnerable module: fribidi
- Introduced through: fribidi@1.0.2-1.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › fribidi@1.0.2-1.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream fribidi package and not the fribidi package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.
Remediation
There is no fixed version for Centos:7 fribidi.
References
low severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.
Remediation
There is no fixed version for Centos:7 giflib.
References
- https://access.redhat.com/security/cve/CVE-2020-23922
- https://sourceforge.net/p/giflib/bugs/151/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://cwe.mitre.org/data/definitions/126.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.
Remediation
There is no fixed version for Centos:7 glibc.
References
- https://security.netapp.com/advisory/ntap-20210401-0006/
- https://access.redhat.com/security/cve/CVE-2020-27618
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://access.redhat.com/errata/RHSA-2021:1585
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202107-07
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- https://security.netapp.com/advisory/ntap-20210401-0006/
- https://access.redhat.com/security/cve/CVE-2020-27618
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://access.redhat.com/errata/RHSA-2021:1585
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202107-07
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-18873
- https://security.gentoo.org/glsa/201908-03
- https://github.com/mdadams/jasper/issues/184
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
jp2_encode in jp2/jp2_enc.c in JasPer 2.0.14 has a heap-based buffer over-read.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-20570
- https://github.com/mdadams/jasper/issues/191
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/94376
- https://bugzilla.redhat.com/show_bug.cgi?id=1396977
- https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a
- https://access.redhat.com/security/cve/CVE-2016-9395
- https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
- http://www.openwall.com/lists/oss-security/2016/11/17/1
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/94380
- https://bugzilla.redhat.com/show_bug.cgi?id=1396981
- https://access.redhat.com/security/cve/CVE-2016-9399
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
- http://www.openwall.com/lists/oss-security/2016/11/17/1
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/106358
- https://security.netapp.com/advisory/ntap-20190321-0002/
- https://access.redhat.com/security/cve/CVE-2018-20483
- https://security.gentoo.org/glsa/201903-08
- http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
- https://twitter.com/marcan42/status/1077676739877232640
- https://access.redhat.com/errata/RHSA-2019:3701
- https://usn.ubuntu.com/3943-1/
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://access.redhat.com/security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: Maintainer contacted. This is a false-positive. The flaw does not actually exist and was erroneously tested.
Remediation
There is no fixed version for Centos:7 libpng.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://access.redhat.com/security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-0908
- https://access.redhat.com/errata/RHSA-2022:7585
- https://access.redhat.com/errata/RHSA-2022:8194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
- https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
- https://gitlab.com/libtiff/libtiff/-/issues/383
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://www.debian.org/security/2022/dsa-5108
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF, there is a memory malloc failure in tif_pixarlog.c. A crafted TIFF document can lead to an abort, resulting in a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://security.netapp.com/advisory/ntap-20210521-0009/
- https://access.redhat.com/security/cve/CVE-2020-35522
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://bugzilla.redhat.com/show_bug.cgi?id=1932037
- https://access.redhat.com/errata/RHSA-2021:4241
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://security.netapp.com/advisory/ntap-20210521-0009/
- https://access.redhat.com/security/cve/CVE-2020-35521
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://bugzilla.redhat.com/show_bug.cgi?id=1932034
- https://access.redhat.com/errata/RHSA-2021:4241
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2022-1056
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
- https://gitlab.com/libtiff/libtiff/-/issues/391
- https://gitlab.com/libtiff/libtiff/-/merge_requests/307
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2024-34459
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/720
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/96188
- https://access.redhat.com/security/cve/CVE-2017-5969
- https://security.gentoo.org/glsa/201711-01
- https://bugzilla.gnome.org/show_bug.cgi?id=778519
- http://www.openwall.com/lists/oss-security/2016/11/05/3
- http://www.openwall.com/lists/oss-security/2017/02/13/1
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2024-34459
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/720
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
- https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/96188
- https://access.redhat.com/security/cve/CVE-2017-5969
- https://security.gentoo.org/glsa/201711-01
- https://bugzilla.gnome.org/show_bug.cgi?id=778519
- http://www.openwall.com/lists/oss-security/2016/11/05/3
- http://www.openwall.com/lists/oss-security/2017/02/13/1
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2021-39537
- http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
- https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
- https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0012/
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2021-39537
- http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
- https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
- https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0012/
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-39537
- http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
- https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
- https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
- http://seclists.org/fulldisclosure/2022/Oct/28
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/43
- http://seclists.org/fulldisclosure/2022/Oct/45
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0012/
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack
Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.
A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.
OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().
We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-0727
- http://www.openwall.com/lists/oss-security/2024/03/11/1
- https://security.netapp.com/advisory/ntap-20240208-0006/
- https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
- https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
- https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
- https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
- https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
- https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html
- https://www.openssl.org/news/secadv/20240125.txt
low severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
Remediation
There is no fixed version for Centos:7 tar.
References
- http://www.securityfocus.com/bid/106354
- https://access.redhat.com/security/cve/CVE-2018-20482
- https://security.gentoo.org/glsa/201903-05
- http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
- http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
- https://news.ycombinator.com/item?id=18745431
- https://twitter.com/thatcks/status/1076166645708668928
- https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
- https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Remediation
There is no fixed version for Centos:7 unzip.
References
- https://access.redhat.com/security/cve/CVE-2022-0530
- http://seclists.org/fulldisclosure/2022/May/33
- http://seclists.org/fulldisclosure/2022/May/35
- http://seclists.org/fulldisclosure/2022/May/38
- https://bugzilla.redhat.com/show_bug.cgi?id=2051395
- https://github.com/ByteHackr/unzip_poc
- https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html
- https://security.gentoo.org/glsa/202310-17
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://www.debian.org/security/2022/dsa-5202
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Remediation
There is no fixed version for Centos:7 unzip.
References
- https://access.redhat.com/security/cve/CVE-2022-0529
- https://bugzilla.redhat.com/show_bug.cgi?id=2051402
- https://bugzilla.redhat.com/show_bug.cgi?id=2051395
- https://github.com/ByteHackr/unzip_poc
- https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html
- https://security.gentoo.org/glsa/202310-17
- https://www.debian.org/security/2022/dsa-5202
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2017-17087
- http://openwall.com/lists/oss-security/2017/11/27/2
- http://security.cucumberlinux.com/security/details.php?id=166
- https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
- https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
- https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
- https://usn.ubuntu.com/4582-1/
- https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-2610
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
- https://security.netapp.com/advisory/ntap-20241129-0006/
- https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a
- https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
- https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2923
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e
- https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2980
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1
- https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-1264
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
- https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6
- https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-2609
- https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad
- https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim 8.2.2348 is affected by null pointer dereference, allows local attackers to cause a denial of service (DoS) via the ex_buffer_all method.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-5441
- https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960
- https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Heap-based Buffer Overflow
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- https://access.redhat.com/security/cve/CVE-2021-3903
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
Remediation
There is no fixed version for Centos:7 libxml2.
References
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377925
- https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
- https://access.redhat.com/security/cve/CVE-2016-8689
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-read_header-archive_read_support_format_7zip-c/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.
Remediation
There is no fixed version for Centos:7 cpio.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The curl_getdate function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94101
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
- https://curl.haxx.se/CVE-2016-8621.patch
- https://curl.haxx.se/docs/adv_20161102G.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8621
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl's ASN1 parser code has the GTime2str() function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the time fraction, leading to
a strlen() getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when CURLINFO_CERTINFO is used.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2024-7264
- https://curl.se/docs/CVE-2024-7264.html
- https://curl.se/docs/CVE-2024-7264.json
- https://hackerone.com/reports/2629968
- https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519
- https://security.netapp.com/advisory/ntap-20240828-0008/
- http://www.openwall.com/lists/oss-security/2024/07/31/1
- https://security.netapp.com/advisory/ntap-20241025-0006/
- https://security.netapp.com/advisory/ntap-20241025-0010/
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://security.netapp.com/advisory/ntap-20210416-0003/
- https://access.redhat.com/security/cve/CVE-2021-28153
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
- https://gitlab.gnome.org/GNOME/glib/-/issues/2325
- https://access.redhat.com/errata/RHSA-2021:4385
- https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
- https://security.gentoo.org/glsa/202107-13
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377925
- https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
- https://access.redhat.com/security/cve/CVE-2016-8689
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-read_header-archive_read_support_format_7zip-c/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The curl_getdate function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94101
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
- https://curl.haxx.se/CVE-2016-8621.patch
- https://curl.haxx.se/docs/adv_20161102G.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8621
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libcurl's ASN1 parser code has the GTime2str() function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the time fraction, leading to
a strlen() getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when CURLINFO_CERTINFO is used.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2024-7264
- https://curl.se/docs/CVE-2024-7264.html
- https://curl.se/docs/CVE-2024-7264.json
- https://hackerone.com/reports/2629968
- https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519
- https://security.netapp.com/advisory/ntap-20240828-0008/
- http://www.openwall.com/lists/oss-security/2024/07/31/1
- https://security.netapp.com/advisory/ntap-20241025-0006/
- https://security.netapp.com/advisory/ntap-20241025-0010/
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- https://seclists.org/bugtraq/2019/Aug/21
- https://seclists.org/bugtraq/2019/Aug/22
- https://seclists.org/bugtraq/2019/Aug/23
- https://seclists.org/bugtraq/2019/Aug/25
- https://seclists.org/bugtraq/2019/Jul/35
- https://seclists.org/bugtraq/2019/Jul/36
- https://seclists.org/bugtraq/2019/Jul/37
- https://seclists.org/bugtraq/2019/Jul/40
- https://seclists.org/bugtraq/2019/Jul/41
- https://seclists.org/bugtraq/2019/Jul/42
- https://security.netapp.com/advisory/ntap-20190806-0004/
- https://security.netapp.com/advisory/ntap-20200122-0003/
- https://support.apple.com/kb/HT210346
- https://support.apple.com/kb/HT210348
- https://support.apple.com/kb/HT210351
- https://support.apple.com/kb/HT210353
- https://support.apple.com/kb/HT210356
- https://support.apple.com/kb/HT210357
- https://support.apple.com/kb/HT210358
- https://access.redhat.com/security/cve/CVE-2019-13118
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
- http://seclists.org/fulldisclosure/2019/Aug/11
- http://seclists.org/fulldisclosure/2019/Aug/13
- http://seclists.org/fulldisclosure/2019/Aug/14
- http://seclists.org/fulldisclosure/2019/Aug/15
- http://seclists.org/fulldisclosure/2019/Jul/22
- http://seclists.org/fulldisclosure/2019/Jul/23
- http://seclists.org/fulldisclosure/2019/Jul/24
- http://seclists.org/fulldisclosure/2019/Jul/26
- http://seclists.org/fulldisclosure/2019/Jul/31
- http://seclists.org/fulldisclosure/2019/Jul/37
- http://seclists.org/fulldisclosure/2019/Jul/38
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069
- https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b
- https://oss-fuzz.com/testcase-detail/5197371471822848
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
- http://www.openwall.com/lists/oss-security/2019/11/17/2
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
- https://usn.ubuntu.com/4164-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
low severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
Remediation
There is no fixed version for Centos:7 libxslt.
References
- https://security.netapp.com/advisory/ntap-20190806-0004/
- https://security.netapp.com/advisory/ntap-20200122-0003/
- https://access.redhat.com/security/cve/CVE-2019-13117
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471
- https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1
- https://oss-fuzz.com/testcase-detail/5631739747106816
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
- http://www.openwall.com/lists/oss-security/2019/11/17/2
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
- https://usn.ubuntu.com/4164-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.
An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-3817
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/31/1
- http://www.openwall.com/lists/oss-security/2023/09/22/11
- http://www.openwall.com/lists/oss-security/2023/09/22/9
- http://www.openwall.com/lists/oss-security/2023/11/06/2
- https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230818-0014/
- https://security.netapp.com/advisory/ntap-20231027-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
- https://www.openssl.org/news/secadv/20230731.txt
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-0465
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230414-0001/
- https://www.debian.org/security/2023/dsa-5417
- https://www.openssl.org/news/secadv/20230328.txt
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.
Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q.
An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.
DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().
Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-5678
- http://www.openwall.com/lists/oss-security/2023/11/06/2
- http://www.openwall.com/lists/oss-security/2024/03/11/1
- https://security.netapp.com/advisory/ntap-20231130-0010/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
- https://www.openssl.org/news/secadv/20231106.txt
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.
However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.
An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option.
The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2023-3446
- http://www.openwall.com/lists/oss-security/2023/07/19/4
- http://www.openwall.com/lists/oss-security/2023/07/19/5
- http://www.openwall.com/lists/oss-security/2023/07/19/6
- http://www.openwall.com/lists/oss-security/2023/07/31/1
- http://www.openwall.com/lists/oss-security/2024/05/16/1
- https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230803-0011/
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
- https://www.openssl.org/news/secadv/20230719.txt
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
Remediation
There is no fixed version for Centos:7 pcre.
References
- https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT212147
- https://access.redhat.com/security/cve/CVE-2020-14155
- http://seclists.org/fulldisclosure/2020/Dec/32
- http://seclists.org/fulldisclosure/2021/Feb/14
- https://bugs.gentoo.org/717920
- https://www.pcre.org/original/changelog.txt
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:4373
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://security.netapp.com/advisory/ntap-20221028-0010/
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-1170
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
- https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c
- https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-5344
- http://seclists.org/fulldisclosure/2023/Dec/10
- http://seclists.org/fulldisclosure/2023/Dec/11
- http://seclists.org/fulldisclosure/2023/Dec/9
- https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
- https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-1175
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
- https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba
- https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
- https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2288
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
- https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2014-8128
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://openwall.com/lists/oss-security/2015/01/24/15
- https://bugzilla.redhat.com/show_bug.cgi?id=1185812
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://www.conostix.com/pub/adv/CVE-2014-8128-LibTIFF-Out-of-bounds_Writes.txt
low severity
- Vulnerable module: readline
- Introduced through: readline@6.2-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › readline@6.2-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream readline package and not the readline package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
Remediation
There is no fixed version for Centos:7 readline.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: nm --without-symbol-version function.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-0397
- https://security.netapp.com/advisory/ntap-20250411-0006/
- http://www.openwall.com/lists/oss-security/2024/06/17/2
- https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
- https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
- https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
- https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
- https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
- https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
- https://github.com/python/cpython/issues/114572
- https://github.com/python/cpython/pull/114573
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-0397
- https://security.netapp.com/advisory/ntap-20250411-0006/
- http://www.openwall.com/lists/oss-security/2024/06/17/2
- https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
- https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
- https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
- https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
- https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
- https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
- https://github.com/python/cpython/issues/114572
- https://github.com/python/cpython/pull/114573
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
low severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
Remediation
There is no fixed version for Centos:7 coreutils.
References
low severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
Remediation
There is no fixed version for Centos:7 coreutils.
References
low severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
Remediation
There is no fixed version for Centos:7 libblkid.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
- https://access.redhat.com/security/cve/CVE-2015-5218
- http://www.spinics.net/lists/util-linux-ng/msg11873.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
low severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
Remediation
There is no fixed version for Centos:7 libmount.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
- https://access.redhat.com/security/cve/CVE-2015-5218
- http://www.spinics.net/lists/util-linux-ng/msg11873.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
low severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
Remediation
There is no fixed version for Centos:7 libuuid.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
- https://access.redhat.com/security/cve/CVE-2015-5218
- http://www.spinics.net/lists/util-linux-ng/msg11873.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
low severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
Remediation
There is no fixed version for Centos:7 util-linux.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
- https://access.redhat.com/security/cve/CVE-2015-5218
- http://www.spinics.net/lists/util-linux-ng/msg11873.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377923
- https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
- https://access.redhat.com/security/cve/CVE-2016-8688
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://www.securityfocus.com/bid/82307
- http://curl.haxx.se/docs/adv_20160127A.html
- https://support.apple.com/HT207170
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-0755
- http://www.debian.org/security/2016/dsa-3455
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
- https://security.gentoo.org/glsa/201701-47
- http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
- http://www.securitytracker.com/id/1034882
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
- http://www.ubuntu.com/usn/USN-2882-1
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/100286
- https://curl.haxx.se/docs/adv_20170809B.html
- https://support.apple.com/HT208221
- https://access.redhat.com/security/cve/CVE-2017-1000100
- http://www.debian.org/security/2017/dsa-3992
- https://security.gentoo.org/glsa/201709-14
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039118
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377923
- https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
- https://access.redhat.com/security/cve/CVE-2016-8688
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://www.securityfocus.com/bid/82307
- http://curl.haxx.se/docs/adv_20160127A.html
- https://support.apple.com/HT207170
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-0755
- http://www.debian.org/security/2016/dsa-3455
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
- https://security.gentoo.org/glsa/201701-47
- http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
- http://www.securitytracker.com/id/1034882
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
- http://www.ubuntu.com/usn/USN-2882-1
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/100286
- https://curl.haxx.se/docs/adv_20170809B.html
- https://support.apple.com/HT208221
- https://access.redhat.com/security/cve/CVE-2017-1000100
- http://www.debian.org/security/2017/dsa-3992
- https://security.gentoo.org/glsa/201709-14
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1039118
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- http://www.securityfocus.com/bid/98556
- https://access.redhat.com/security/cve/CVE-2017-9048
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- http://www.securityfocus.com/bid/98556
- https://access.redhat.com/security/cve/CVE-2017-9048
- http://www.debian.org/security/2017/dsa-3952
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://seclists.org/bugtraq/2019/Dec/39
- https://seclists.org/bugtraq/2019/Dec/46
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
- https://security.netapp.com/advisory/ntap-20191210-0001/
- https://www.openssl.org/news/secadv/20191206.txt
- https://www.tenable.com/security/tns-2019-09
- https://www.tenable.com/security/tns-2020-03
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2021-10
- https://access.redhat.com/security/cve/CVE-2019-1551
- https://www.debian.org/security/2019/dsa-4594
- https://www.debian.org/security/2021/dsa-4855
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
- https://security.gentoo.org/glsa/202004-10
- http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://access.redhat.com/errata/RHSA-2020:4514
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
- https://usn.ubuntu.com/4376-1/
- https://usn.ubuntu.com/4504-1/
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
- https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module.
When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-7592
- https://github.com/python/cpython/issues/123067
- https://github.com/python/cpython/pull/123075
- https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
- https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
- https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
- https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
- https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
- https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
- https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
- https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
- https://security.netapp.com/advisory/ntap-20241018-0006/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module.
When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-7592
- https://github.com/python/cpython/issues/123067
- https://github.com/python/cpython/pull/123075
- https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
- https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
- https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
- https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
- https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
- https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
- https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
- https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
- https://security.netapp.com/advisory/ntap-20241018-0006/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Use After Free
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- https://access.redhat.com/security/cve/CVE-2021-4069
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
- https://security.gentoo.org/glsa/202208-32
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20190822-0001/
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2019-1010204
- https://sourceware.org/bugzilla/show_bug.cgi?id=23765
- https://access.redhat.com/errata/RHSA-2020:1797
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&%3Butm_medium=RSS
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Binutils. The field the_bfd of asymbolstruct is uninitialized in the bfd_mach_o_get_synthetic_symtab function, which may lead to an application crash and local denial of service.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2023-25588
- https://bugzilla.redhat.com/show_bug.cgi?id=2167505
- https://security.netapp.com/advisory/ntap-20231103-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29677
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2023-25585
- https://bugzilla.redhat.com/show_bug.cgi?id=2167498
- https://security.netapp.com/advisory/ntap-20231103-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29892
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
low severity
- Vulnerable module: libblkid
- Introduced through: libblkid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libblkid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libblkid package and not the libblkid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Remediation
There is no fixed version for Centos:7 libblkid.
References
- https://security.netapp.com/advisory/ntap-20210902-0002/
- https://access.redhat.com/security/cve/CVE-2021-37600
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
- https://security.gentoo.org/glsa/202401-08
low severity
- Vulnerable module: libmount
- Introduced through: libmount@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libmount@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libmount package and not the libmount package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Remediation
There is no fixed version for Centos:7 libmount.
References
- https://security.netapp.com/advisory/ntap-20210902-0002/
- https://access.redhat.com/security/cve/CVE-2021-37600
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
- https://security.gentoo.org/glsa/202401-08
low severity
- Vulnerable module: libuuid
- Introduced through: libuuid@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libuuid@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libuuid package and not the libuuid package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Remediation
There is no fixed version for Centos:7 libuuid.
References
- https://security.netapp.com/advisory/ntap-20210902-0002/
- https://access.redhat.com/security/cve/CVE-2021-37600
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
- https://security.gentoo.org/glsa/202401-08
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
Remediation
There is no fixed version for Centos:7 ncurses.
References
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation.
Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency.
There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-13176
- https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844
- https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467
- https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902
- https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65
- https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f
- https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded
- https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86
- https://openssl-library.org/news/secadv/20250120.txt
- http://www.openwall.com/lists/oss-security/2025/01/20/2
- https://security.netapp.com/advisory/ntap-20250124-0005/
- https://security.netapp.com/advisory/ntap-20250418-0010/
- https://lists.debian.org/debian-lts-announce/2025/05/msg00028.html
- https://security.netapp.com/advisory/ntap-20250502-0006/
low severity
- Vulnerable module: shadow-utils
- Introduced through: shadow-utils@2:4.6-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › shadow-utils@2:4.6-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow-utils package and not the shadow-utils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
Remediation
There is no fixed version for Centos:7 shadow-utils.
References
- https://access.redhat.com/security/cve/CVE-2023-4641
- https://access.redhat.com/errata/RHSA-2023:6632
- https://access.redhat.com/errata/RHSA-2023:7112
- https://access.redhat.com/errata/RHSA-2024:0417
- https://access.redhat.com/errata/RHSA-2024:2577
- https://bugzilla.redhat.com/show_bug.cgi?id=2215945
- https://lists.debian.org/debian-lts-announce/2025/04/msg00026.html
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.
Remediation
There is no fixed version for Centos:7 sqlite.
References
low severity
- Vulnerable module: util-linux
- Introduced through: util-linux@2.23.2-63.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › util-linux@2.23.2-63.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Remediation
There is no fixed version for Centos:7 util-linux.
References
- https://security.netapp.com/advisory/ntap-20210902-0002/
- https://access.redhat.com/security/cve/CVE-2021-37600
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
- https://security.gentoo.org/glsa/202401-08
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a :s command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive :s call causes free-ing of memory which may later then be accessed by the initial :s command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48706
- http://www.openwall.com/lists/oss-security/2023/11/22/3
- https://github.com/gandalf4a/crash_report/blob/main/vim/vim_huaf
- https://github.com/vim/vim/commit/26c11c56888d01e298cd8044caf860f3c26f57bb
- https://github.com/vim/vim/pull/13552
- https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNMFS3IH74KEMMESOA3EOB6MZ56TWGFF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVA7K73WHQH4KVFDJQ7ELIUD2WK5ZT5E/
- https://security.netapp.com/advisory/ntap-20240105-0001/
low severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an improved version of the unix vi text editor. When flushing the typeahead buffer, Vim moves the current position in the typeahead buffer but does not check whether there is enough space left in the buffer to handle the next characters. So this may lead to the tb_off position within the typebuf variable to point outside of the valid buffer size, which can then later lead to a heap-buffer overflow in e.g. ins_typebuf(). Therefore, when flushing the typeahead buffer, check if there is enough space left before advancing the off position. If not, fall back to flush current typebuf contents. It's not quite clear yet, what can lead to this situation. It seems to happen when error messages occur (which will cause Vim to flush the typeahead buffer) in comnination with several long mappgins and so it may eventually move the off position out of a valid buffer size. Impact is low since it is not easily reproducible and requires to have several mappings active and run into some error condition. But when this happens, this will cause a crash. The issue has been fixed as of Vim patch v9.1.0697. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of a line. Back then we assumed this loop is unnecessary. However, this change made it possible that the cursor position stays invalid and points beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at the specified cursor position. It's not quite clear yet, what can lead to this situation that the cursor points to an invalid position. That's why patch v9.1.0707 does not include a test case. The only observed impact has been a program crash. This issue has been addressed in with the patch v9.1.0707. All users are advised to upgrade.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://access.redhat.com/security/cve/CVE-2019-17451
- https://security.gentoo.org/glsa/202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- https://access.redhat.com/errata/RHSA-2020:1797
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11413
- https://sourceware.org/bugzilla/attachment.cgi?id=16362
- https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
- https://vuldb.com/?ctiid.327349
- https://vuldb.com/?id.327349
- https://vuldb.com/?submit.665587
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
Remediation
There is no fixed version for Centos:7 glib2.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
- https://security.netapp.com/advisory/ntap-20190806-0003/
- https://access.redhat.com/security/cve/CVE-2019-13012
- https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
- https://gitlab.gnome.org/GNOME/glib/issues/1658
- https://gitlab.gnome.org/GNOME/glib/merge_requests/450
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00004.html
- https://access.redhat.com/errata/RHSA-2021:1586
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html
- https://usn.ubuntu.com/4049-1/
- https://usn.ubuntu.com/4049-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer over-read of size 8 in the function jas_image_depalettize in libjasper/base/jas_image.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-19541
- https://github.com/mdadams/jasper/issues/182
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1262846
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
- https://access.redhat.com/security/cve/CVE-2015-5276
- http://www.securitytracker.com/id/1034375
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1262846
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
- https://access.redhat.com/security/cve/CVE-2015-5276
- http://www.securitytracker.com/id/1034375
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: procps-ng
- Introduced through: procps-ng@3.3.10-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › procps-ng@3.3.10-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream procps-ng package and not the procps-ng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
Remediation
There is no fixed version for Centos:7 procps-ng.
References
- http://www.securityfocus.com/bid/104214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
- https://access.redhat.com/security/cve/CVE-2018-1125
- https://www.debian.org/security/2018/dsa-4208
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- http://seclists.org/oss-sec/2018/q2/122
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
- https://usn.ubuntu.com/3658-1/
- https://usn.ubuntu.com/3658-3/
- https://www.exploit-db.com/exploits/44806
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to 9.0.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2289
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
- https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/105693
- https://access.redhat.com/security/cve/CVE-2018-18484
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: bzip2-libs
- Introduced through: bzip2-libs@1.0.6-13.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bzip2-libs@1.0.6-13.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bzip2-libs package and not the bzip2-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
Remediation
There is no fixed version for Centos:7 bzip2-libs.
References
- http://www.securityfocus.com/bid/91297
- https://seclists.org/bugtraq/2019/Aug/4
- https://seclists.org/bugtraq/2019/Jul/22
- https://bugzilla.redhat.com/show_bug.cgi?id=1319648
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2016-3189
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
- https://security.gentoo.org/glsa/201708-08
- http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
- http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301@%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73@%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e@%3Cjira.kafka.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
- http://www.openwall.com/lists/oss-security/2016/06/20/1
- http://www.securitytracker.com/id/1036132
- https://usn.ubuntu.com/4038-1/
- https://usn.ubuntu.com/4038-2/
- https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
- https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
- https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
- https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
low severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.
Remediation
There is no fixed version for Centos:7 cairo.
References
- http://www.securityfocus.com/bid/93931
- https://bugs.freedesktop.org/attachment.cgi?id=127421
- https://bugs.freedesktop.org/show_bug.cgi?id=98165
- https://bugzilla.redhat.com/show_bug.cgi?id=1312337
- https://access.redhat.com/security/cve/CVE-2016-9082
- https://security.gentoo.org/glsa/201904-01
- http://www.openwall.com/lists/oss-security/2016/10/27/2
low severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
Remediation
There is no fixed version for Centos:7 cpio.
References
- http://www.securityfocus.com/bid/82293
- https://access.redhat.com/security/cve/CVE-2016-2037
- http://www.debian.org/security/2016/dsa-3483
- http://www.openwall.com/lists/oss-security/2016/01/19/4
- http://www.openwall.com/lists/oss-security/2016/01/22/4
- http://www.securitytracker.com/id/1035067
- http://www.ubuntu.com/usn/USN-2906-1
low severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
Remediation
There is no fixed version for Centos:7 giflib.
References
- http://www.securityfocus.com/bid/88103
- https://bugzilla.redhat.com/show_bug.cgi?id=1325771
- https://sourceforge.net/p/giflib/bugs/87/
- https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/
- https://access.redhat.com/security/cve/CVE-2016-3977
- http://bugs.fi/fuzzing/index.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00084.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00019.html
- https://usn.ubuntu.com/4107-1/
low severity
- Vulnerable module: gtk2
- Introduced through: gtk2@2.24.31-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gtk2@2.24.31-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gtk2 package and not the gtk2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
Remediation
There is no fixed version for Centos:7 gtk2.
References
- http://www.securityfocus.com/bid/83239
- https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
- https://bugzilla.gnome.org/show_bug.cgi?id=703220
- https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
- https://git.gnome.org/browse/gtk+/tree/NEWS
- https://github.com/mate-desktop/eom/issues/93
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/security/cve/CVE-2013-7447
- http://www.openwall.com/lists/oss-security/2016/02/10/2
- http://www.openwall.com/lists/oss-security/2016/02/10/6
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
- http://www.ubuntu.com/usn/USN-2898-1
- http://www.ubuntu.com/usn/USN-2898-2
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function jpc_dec_process_sot() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack by triggering an unexpected jpc_ppmstabtostreams return value, a different vulnerability than CVE-2018-9154.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/security/cve/CVE-2017-13745
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485274
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The (1) cpStrips and (2) cpTiles functions in the thumbnail tool in LibTIFF 4.0.6 and earlier allow remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the bytecounts[] array variable.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- https://access.redhat.com/security/cve/CVE-2021-45346
- https://github.com/guyinatuxedo/sqlite3_record_leaking
- https://security.netapp.com/advisory/ntap-20220303-0001/
- https://sqlite.org/forum/forumpost/056d557c2f8c452ed5
- https://sqlite.org/forum/forumpost/53de8864ba114bf6
- https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit cb0b99f0 which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48232
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce
- https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0006/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit 58f9befca1 which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48234
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca
- https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0004/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an
overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit 060623e which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48235
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200
- https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0007/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit ac6378773 which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48233
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78
- https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0003/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger
than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit 73b2d379 which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48236
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968
- https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0002/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit 6bf131888 which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48237
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e
- https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0005/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit 25aabc2b which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-48231
- http://www.openwall.com/lists/oss-security/2023/11/16/1
- https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a
- https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
- https://security.netapp.com/advisory/ntap-20231227-0008/
low severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
Remediation
There is no fixed version for Centos:7 openldap.
References
- https://access.redhat.com/security/cve/CVE-2020-15719
- https://bugs.openldap.org/show_bug.cgi?id=9266
- https://bugzilla.redhat.com/show_bug.cgi?id=1740070
- https://access.redhat.com/errata/RHBA-2019:3674
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
Remediation
There is no fixed version for Centos:7 python.
References
- https://security.netapp.com/advisory/ntap-20200221-0003/
- https://access.redhat.com/security/cve/CVE-2019-9674
- https://bugs.python.org/issue36260
- https://bugs.python.org/issue36462
- https://github.com/python/cpython/blob/master/Lib/zipfile.py
- https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
- https://www.python.org/news/security/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
- https://usn.ubuntu.com/4428-1/
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://security.netapp.com/advisory/ntap-20200221-0003/
- https://access.redhat.com/security/cve/CVE-2019-9674
- https://bugs.python.org/issue36260
- https://bugs.python.org/issue36462
- https://github.com/python/cpython/blob/master/Lib/zipfile.py
- https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
- https://www.python.org/news/security/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
- https://usn.ubuntu.com/4428-1/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2025-22134
- https://github.com/vim/vim/commit/c9a1e257f1630a0866447e53a564f7ff96a80ead
- https://github.com/vim/vim/security/advisories/GHSA-5rgf-26wj-48v8
- http://www.openwall.com/lists/oss-security/2025/01/11/1
- https://security.netapp.com/advisory/ntap-20250314-0004/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2025-24014
- https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919
- https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955
- http://www.openwall.com/lists/oss-security/2025/01/20/4
- http://www.openwall.com/lists/oss-security/2025/01/21/1
- https://security.netapp.com/advisory/ntap-20250314-0005/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source command line text editor. double-free in dialog_changed() in Vim < v9.1.0648. When abandoning a buffer, Vim may ask the user what to do with the modified buffer. If the user wants the changed buffer to be saved, Vim may create a new Untitled file, if the buffer did not have a name yet. However, when setting the buffer name to Unnamed, Vim will falsely free a pointer twice, leading to a double-free and possibly later to a heap-use-after-free, which can lead to a crash. The issue has been fixed as of Vim patch v9.1.0648.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is a greatly improved version of the good old UNIX editor Vi. Vim allows to redirect screen messages using the :redir ex command to register, variables and files. It also allows to show the contents of registers using the :registers or :display ex command. When redirecting the output of :display to a register, Vim will free the register content before storing the new content in the register. Now when redirecting the :display command to a register that is being displayed, Vim will free the content while shortly afterwards trying to access it, which leads to a use-after-free. Vim pre 9.1.1115 checks in the ex_display() function, that it does not try to redirect to a register while displaying this register at the same time. However this check is not complete, and so Vim does not check the + and * registers (which typically donate the X11/clipboard registers, and when a clipboard connection is not possible will fall back to use register 0 instead. In Patch 9.1.1115 Vim will therefore skip outputting to register zero when trying to redirect to the clipboard registers * or +. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://advisories.mageia.org/MGASA-2015-0106.html
- https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526
- https://github.com/libarchive/libarchive/pull/110
- https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
- https://access.redhat.com/security/cve/CVE-2015-2304
- http://www.debian.org/security/2015/dsa-3180
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc
- https://security.gentoo.org/glsa/201701-03
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:157
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/16/7
- http://www.securitytracker.com/id/1035996
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html
- http://www.ubuntu.com/usn/USN-2549-1
- https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
low severity
- Vulnerable module: cpio
- Introduced through: cpio@2.11-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cpio@2.11-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio package and not the cpio package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
Remediation
There is no fixed version for Centos:7 cpio.
References
- http://www.securityfocus.com/bid/71914
- http://advisories.mageia.org/MGASA-2015-0080.html
- https://access.redhat.com/security/cve/CVE-2015-1197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
- https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/18/7
- http://www.ubuntu.com/usn/USN-2906-1
- http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
- http://www.openwall.com/lists/oss-security/2023/12/21/8
- http://www.openwall.com/lists/oss-security/2023/12/27/1
low severity
- Vulnerable module: cracklib
- Introduced through: cracklib@2.9.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cracklib@2.9.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cracklib package and not the cracklib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
Remediation
There is no fixed version for Centos:7 cracklib.
References
- http://www.securityfocus.com/bid/92478
- https://access.redhat.com/security/cve/CVE-2016-6318
- https://security.gentoo.org/glsa/201612-25
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
- http://www.openwall.com/lists/oss-security/2016/08/16/2
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: cracklib-dicts
- Introduced through: cracklib-dicts@2.9.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cracklib-dicts@2.9.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cracklib-dicts package and not the cracklib-dicts package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
Remediation
There is no fixed version for Centos:7 cracklib-dicts.
References
- http://www.securityfocus.com/bid/92478
- https://access.redhat.com/security/cve/CVE-2016-6318
- https://security.gentoo.org/glsa/201612-25
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
- http://www.openwall.com/lists/oss-security/2016/08/16/2
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=81053
- https://access.redhat.com/security/cve/CVE-2014-3638
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80559
- https://access.redhat.com/security/cve/CVE-2014-3637
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.openwall.com/lists/oss-security/2019/06/24/13
- http://www.openwall.com/lists/oss-security/2019/06/24/14
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80919
- https://access.redhat.com/security/cve/CVE-2014-3639
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=82820
- https://access.redhat.com/security/cve/CVE-2014-3636
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=81053
- https://access.redhat.com/security/cve/CVE-2014-3638
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80559
- https://access.redhat.com/security/cve/CVE-2014-3637
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.openwall.com/lists/oss-security/2019/06/24/13
- http://www.openwall.com/lists/oss-security/2019/06/24/14
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=80919
- https://access.redhat.com/security/cve/CVE-2014-3639
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2014-0395.html
- https://bugs.freedesktop.org/show_bug.cgi?id=82820
- https://access.redhat.com/security/cve/CVE-2014-3636
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://secunia.com/advisories/61378
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://www.ubuntu.com/usn/USN-2352-1
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
low severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://access.redhat.com/security/cve/CVE-2014-9746
- http://www.debian.org/security/2015/dsa-3370
- https://savannah.nongnu.org/bugs/?41309
- http://www.openwall.com/lists/oss-security/2015/09/11/4
- http://www.openwall.com/lists/oss-security/2015/09/25/4
low severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://www.securityfocus.com/bid/76727
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
- http://savannah.nongnu.org/bugs/index.php?41590
- https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124
- https://code.google.com/p/chromium/issues/detail?id=459050
- https://access.redhat.com/security/cve/CVE-2014-9745
- http://www.debian.org/security/2015/dsa-3370
- http://www.securitytracker.com/id/1033536
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html
- http://www.ubuntu.com/usn/USN-2739-1
low severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.
Remediation
There is no fixed version for Centos:7 freetype.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- https://access.redhat.com/security/cve/CVE-2014-9747
- http://www.debian.org/security/2015/dsa-3370
- https://savannah.nongnu.org/bugs/?41309
- http://www.openwall.com/lists/oss-security/2015/09/11/4
- http://www.openwall.com/lists/oss-security/2015/09/25/4
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/72602
- https://sourceware.org/bugzilla/show_bug.cgi?id=16009
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
- https://access.redhat.com/security/cve/CVE-2015-8982
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2015/02/13/3
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/72602
- https://sourceware.org/bugzilla/show_bug.cgi?id=16009
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
- https://access.redhat.com/security/cve/CVE-2015-8982
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2015/02/13/3
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://advisories.mageia.org/MGASA-2015-0106.html
- https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526
- https://github.com/libarchive/libarchive/pull/110
- https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
- https://access.redhat.com/security/cve/CVE-2015-2304
- http://www.debian.org/security/2015/dsa-3180
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc
- https://security.gentoo.org/glsa/201701-03
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:157
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/16/7
- http://www.securitytracker.com/id/1035996
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html
- http://www.ubuntu.com/usn/USN-2549-1
- https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
low severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory usage would be a denial of service, is that the application should interpret libjpeg warnings as fatal errors (aborting decompression) and/or set limits on resource consumption or image sizes
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
low severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- http://www.securityfocus.com/bid/105151
- https://gitlab.com/gnutls/libtasn1/issues/4
- https://access.redhat.com/security/cve/CVE-2018-1000654
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
Remediation
There is no fixed version for Centos:7 libxslt.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-6075
- https://github.com/python/cpython/issues/136065
- https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/
- https://github.com/python/cpython/commit/2e6150adccaaf5bd95d4c19dfd04a36e0b325d8c
- https://github.com/python/cpython/commit/631ba3407e3348ccd56ce5160c4fb2c5dc5f4d84
- https://github.com/python/cpython/commit/892747b4cf0f95ba8beb51c0d0658bfaa381ebca
- https://github.com/python/cpython/commit/9ab89c026aa9611c4b0b67c288b8303a480fe742
- https://github.com/python/cpython/commit/c8a5f3435c342964e0a432cc9fb448b7dbecd1ba
- https://github.com/python/cpython/commit/f029e8db626ddc6e3a3beea4eff511a71aaceb5c
- https://github.com/python/cpython/commit/5dceb93486176e6b4a6d9754491005113eb23427
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-6075
- https://github.com/python/cpython/issues/136065
- https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/
- https://github.com/python/cpython/commit/2e6150adccaaf5bd95d4c19dfd04a36e0b325d8c
- https://github.com/python/cpython/commit/631ba3407e3348ccd56ce5160c4fb2c5dc5f4d84
- https://github.com/python/cpython/commit/892747b4cf0f95ba8beb51c0d0658bfaa381ebca
- https://github.com/python/cpython/commit/9ab89c026aa9611c4b0b67c288b8303a480fe742
- https://github.com/python/cpython/commit/c8a5f3435c342964e0a432cc9fb448b7dbecd1ba
- https://github.com/python/cpython/commit/f029e8db626ddc6e3a3beea4eff511a71aaceb5c
- https://github.com/python/cpython/commit/5dceb93486176e6b4a6d9754491005113eb23427
low severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The machinectl command in oci-register-machine allows local users to list running containers and possibly obtain sensitive information by running that command.
Remediation
There is no fixed version for Centos:7 systemd.
References
- http://www.securityfocus.com/bid/92143
- https://bugzilla.redhat.com/show_bug.cgi?id=1360634
- https://github.com/projectatomic/oci-register-machine/pull/22
- https://access.redhat.com/security/cve/CVE-2016-6349
- http://www.openwall.com/lists/oss-security/2016/07/26/9
- http://www.openwall.com/lists/oss-security/2016/10/13/7
low severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The machinectl command in oci-register-machine allows local users to list running containers and possibly obtain sensitive information by running that command.
Remediation
There is no fixed version for Centos:7 systemd-libs.
References
- http://www.securityfocus.com/bid/92143
- https://bugzilla.redhat.com/show_bug.cgi?id=1360634
- https://github.com/projectatomic/oci-register-machine/pull/22
- https://access.redhat.com/security/cve/CVE-2016-6349
- http://www.openwall.com/lists/oss-security/2016/07/26/9
- http://www.openwall.com/lists/oss-security/2016/10/13/7
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function ga_grow_inner in in the file src/alloc.c at line 748, which is freed in the file src/ex_docmd.c in the function do_cmdline at line 1010 and then used again in src/cmdhist.c at line 759. When using the :history command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-46246
- https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a
- https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNMFS3IH74KEMMESOA3EOB6MZ56TWGFF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVA7K73WHQH4KVFDJQ7ELIUD2WK5ZT5E/
- https://security.netapp.com/advisory/ntap-20231208-0006/
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: procps-ng
- Introduced through: procps-ng@3.3.10-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › procps-ng@3.3.10-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream procps-ng package and not the procps-ng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
Remediation
There is no fixed version for Centos:7 procps-ng.
References
- http://www.securityfocus.com/bid/104214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
- https://access.redhat.com/security/cve/CVE-2018-1123
- https://www.debian.org/security/2018/dsa-4208
- https://www.exploit-db.com/exploits/44806/
- https://security.gentoo.org/glsa/201805-14
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- http://seclists.org/oss-sec/2018/q2/122
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
- https://usn.ubuntu.com/3658-1/
- https://usn.ubuntu.com/3658-3/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: procps-ng
- Introduced through: procps-ng@3.3.10-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › procps-ng@3.3.10-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream procps-ng package and not the procps-ng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.
Remediation
There is no fixed version for Centos:7 procps-ng.
References
- http://www.securityfocus.com/bid/104214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
- https://access.redhat.com/security/cve/CVE-2018-1121
- https://www.exploit-db.com/exploits/44806/
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- http://seclists.org/oss-sec/2018/q2/122
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2024-47814
- https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3
- https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg
- https://security.netapp.com/advisory/ntap-20250411-0009/
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
low severity
- Vulnerable module: bind-license
- Introduced through: bind-license@32:9.11.4-16.P2.el7_8.6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bind-license@32:9.11.4-16.P2.el7_8.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-license package and not the bind-license package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Cache Poisoning issue exists in DNS Response Rate Limiting.
Remediation
There is no fixed version for Centos:7 bind-license.
References
low severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.22-24.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › coreutils@8.22-24.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
Remediation
There is no fixed version for Centos:7 coreutils.
References
- http://advisories.mageia.org/MGASA-2015-0029.html
- http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
- https://access.redhat.com/security/cve/CVE-2014-9471
- https://security.gentoo.org/glsa/201612-22
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:179
- http://www.openwall.com/lists/oss-security/2014/11/25/1
- http://www.openwall.com/lists/oss-security/2014/11/25/4
- http://www.openwall.com/lists/oss-security/2015/01/03/11
- http://secunia.com/advisories/62226
- http://ubuntu.com/usn/usn-2473-1
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde () character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /2/foo while accessing a server with a specific user.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-27534
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1892351
- https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0012/
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously wasused to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-28322
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- http://seclists.org/fulldisclosure/2023/Jul/47
- http://seclists.org/fulldisclosure/2023/Jul/48
- http://seclists.org/fulldisclosure/2023/Jul/52
- https://hackerone.com/reports/1954658
- https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called curl_easy_duphandle.
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
none (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
none - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2023-38546
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://curl.se/docs/CVE-2023-38546.html
- https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
- https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94094
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
- https://curl.haxx.se/CVE-2016-8616.patch
- https://curl.haxx.se/docs/adv_20161102B.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8616
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The URL percent-encoding decode function in libcurl before 7.51.0 is called curl_easy_unescape. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94105
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
- https://curl.haxx.se/docs/adv_20161102H.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8622
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2020-8231
- https://www.debian.org/security/2021/dsa-4881
- https://security.gentoo.org/glsa/202012-14
- https://curl.haxx.se/docs/CVE-2020-8231.html
- https://hackerone.com/reports/948876
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/82990
- https://bto.bluecoat.com/security-advisory/sa128
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2015-8386
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
- https://security.gentoo.org/glsa/201607-02
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- https://access.redhat.com/errata/RHSA-2016:1132
- https://access.redhat.com/errata/RHSA-2016:1025
- https://security.netapp.com/advisory/ntap-20230216-0002/
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
Remediation
There is no fixed version for Centos:7 glib2.
References
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/97067
- https://access.redhat.com/security/cve/CVE-2017-7246
- https://security.gentoo.org/glsa/201710-25
- https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
- https://access.redhat.com/errata/RHSA-2018:2486
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/97067
- https://access.redhat.com/security/cve/CVE-2017-7245
- https://security.gentoo.org/glsa/201710-25
- https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
- https://access.redhat.com/errata/RHSA-2018:2486
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Remediation
There is no fixed version for Centos:7 glib2.
References
low severity
new
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Remediation
There is no fixed version for Centos:7 glib2.
References
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.
Remediation
There is no fixed version for Centos:7 glib2.
References
low severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-46.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › krb5-libs@1.15.1-46.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
Remediation
There is no fixed version for Centos:7 krb5-libs.
References
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
- https://bugzilla.redhat.com/show_bug.cgi?id=1488873
- https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
- https://access.redhat.com/security/cve/CVE-2017-11462
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde () character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /2/foo while accessing a server with a specific user.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-27534
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://hackerone.com/reports/1892351
- https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230420-0012/
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously wasused to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-28322
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- http://seclists.org/fulldisclosure/2023/Jul/47
- http://seclists.org/fulldisclosure/2023/Jul/48
- http://seclists.org/fulldisclosure/2023/Jul/52
- https://hackerone.com/reports/1954658
- https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called curl_easy_duphandle.
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
none (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
none - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2023-38546
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://curl.se/docs/CVE-2023-38546.html
- https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
- https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94094
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
- https://curl.haxx.se/CVE-2016-8616.patch
- https://curl.haxx.se/docs/adv_20161102B.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8616
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The URL percent-encoding decode function in libcurl before 7.51.0 is called curl_easy_unescape. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94105
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
- https://curl.haxx.se/docs/adv_20161102H.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8622
- https://security.gentoo.org/glsa/201701-47
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2020-8231
- https://www.debian.org/security/2021/dsa-4881
- https://security.gentoo.org/glsa/202012-14
- https://curl.haxx.se/docs/CVE-2020-8231.html
- https://hackerone.com/reports/948876
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1610
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
Remediation
There is no fixed version for Centos:7 libidn.
References
- http://www.securityfocus.com/bid/92070
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
- https://access.redhat.com/security/cve/CVE-2016-6263
- http://www.debian.org/security/2016/dsa-3658
- https://security.gentoo.org/glsa/201908-06
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
- http://www.openwall.com/lists/oss-security/2016/07/20/6
- http://www.openwall.com/lists/oss-security/2016/07/21/4
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.ubuntu.com/usn/USN-3068-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
Remediation
There is no fixed version for Centos:7 libidn.
References
- http://www.securityfocus.com/bid/72736
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
- https://github.com/jabberd2/jabberd2/issues/85
- https://access.redhat.com/security/cve/CVE-2015-2059
- http://www.debian.org/security/2016/dsa-3578
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
- http://www.openwall.com/lists/oss-security/2015/02/23/25
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.ubuntu.com/usn/USN-3068-1
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
Remediation
There is no fixed version for Centos:7 libidn.
References
- http://www.securityfocus.com/bid/92070
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
- https://access.redhat.com/security/cve/CVE-2015-8948
- http://www.debian.org/security/2016/dsa-3658
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
- http://www.openwall.com/lists/oss-security/2016/07/20/6
- http://www.openwall.com/lists/oss-security/2016/07/21/4
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.ubuntu.com/usn/USN-3068-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
Remediation
There is no fixed version for Centos:7 libidn.
References
- http://www.securityfocus.com/bid/92070
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
- https://access.redhat.com/security/cve/CVE-2016-6262
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
- http://www.openwall.com/lists/oss-security/2016/07/20/6
- http://www.openwall.com/lists/oss-security/2016/07/21/4
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.ubuntu.com/usn/USN-3068-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
Remediation
There is no fixed version for Centos:7 libidn.
References
- http://www.securityfocus.com/bid/92070
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
- https://access.redhat.com/security/cve/CVE-2016-6261
- http://www.debian.org/security/2016/dsa-3658
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
- https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
- http://www.openwall.com/lists/oss-security/2016/07/20/6
- http://www.openwall.com/lists/oss-security/2016/07/21/4
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.ubuntu.com/usn/USN-3068-1
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
- Fixed in: 2:1.5.13-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libpng before 1.6.32 does not properly check the length of chunks against the user limit.
Remediation
Upgrade Centos:7 libpng to version 2:1.5.13-8.el7 or higher.
References
- http://www.securityfocus.com/bid/109269
- https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE
- https://support.f5.com/csp/article/K88124225
- https://support.f5.com/csp/article/K88124225?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/security/cve/CVE-2017-12652
- https://access.redhat.com/errata/RHSA-2020:3901
- https://support.f5.com/csp/article/K88124225?utm_source=f5support&%3Butm_medium=RSS
- https://github.com/pnggroup/libpng/commit/347538efbdc21b8df684ebd92d37400b3ce85d55
- https://security.netapp.com/advisory/ntap-20220506-0003/
low severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
Remediation
There is no fixed version for Centos:7 libssh2.
References
- https://access.redhat.com/security/cve/CVE-2023-6918
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
- https://access.redhat.com/errata/RHSA-2024:2504
- https://access.redhat.com/errata/RHSA-2024:3233
- https://bugzilla.redhat.com/show_bug.cgi?id=2254997
- https://security.netapp.com/advisory/ntap-20250214-0009/
- https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
- https://www.libssh.org/security/advisories/CVE-2023-6918.txt
low severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
Remediation
There is no fixed version for Centos:7 libxml2.
References
low severity
new
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
low severity
- Vulnerable module: nss-softokn
- Introduced through: nss-softokn@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn package and not the nss-softokn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
Remediation
There is no fixed version for Centos:7 nss-softokn.
References
- http://www.securityfocus.com/bid/81955
- http://www.securityfocus.com/bid/91787
- https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
- https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
- http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://access.redhat.com/security/cve/CVE-2016-1938
- http://www.debian.org/security/2016/dsa-3688
- https://security.gentoo.org/glsa/201605-06
- https://security.gentoo.org/glsa/201701-46
- https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
- http://www.securitytracker.com/id/1034825
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
- http://www.ubuntu.com/usn/USN-2880-1
- http://www.ubuntu.com/usn/USN-2880-2
- http://www.ubuntu.com/usn/USN-2903-1
- http://www.ubuntu.com/usn/USN-2903-2
- http://www.ubuntu.com/usn/USN-2973-1
low severity
- Vulnerable module: nss-softokn-freebl
- Introduced through: nss-softokn-freebl@3.44.0-8.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-softokn-freebl@3.44.0-8.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-softokn-freebl package and not the nss-softokn-freebl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
Remediation
There is no fixed version for Centos:7 nss-softokn-freebl.
References
- http://www.securityfocus.com/bid/81955
- http://www.securityfocus.com/bid/91787
- https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
- https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
- http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://access.redhat.com/security/cve/CVE-2016-1938
- http://www.debian.org/security/2016/dsa-3688
- https://security.gentoo.org/glsa/201605-06
- https://security.gentoo.org/glsa/201701-46
- https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
- http://www.securitytracker.com/id/1034825
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
- http://www.ubuntu.com/usn/USN-2880-1
- http://www.ubuntu.com/usn/USN-2880-2
- http://www.ubuntu.com/usn/USN-2903-1
- http://www.ubuntu.com/usn/USN-2903-2
- http://www.ubuntu.com/usn/USN-2973-1
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
- https://seclists.org/bugtraq/2019/Oct/0
- https://seclists.org/bugtraq/2019/Oct/1
- https://seclists.org/bugtraq/2019/Sep/25
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
- https://security.netapp.com/advisory/ntap-20190919-0002/
- https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
- https://www.openssl.org/news/secadv/20190910.txt
- https://www.tenable.com/security/tns-2019-09
- https://access.redhat.com/security/cve/CVE-2019-1563
- https://www.debian.org/security/2019/dsa-4539
- https://www.debian.org/security/2019/dsa-4540
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
- https://security.gentoo.org/glsa/201911-04
- http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2020:1840
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
- https://usn.ubuntu.com/4376-1/
- https://usn.ubuntu.com/4376-2/
- https://usn.ubuntu.com/4504-1/
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
- https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/97067
- https://access.redhat.com/security/cve/CVE-2017-7246
- https://security.gentoo.org/glsa/201710-25
- https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
- https://access.redhat.com/errata/RHSA-2018:2486
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/97067
- https://access.redhat.com/security/cve/CVE-2017-7245
- https://security.gentoo.org/glsa/201710-25
- https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
- https://access.redhat.com/errata/RHSA-2018:2486
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
Remediation
There is no fixed version for Centos:7 pcre.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.
CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-4032
- http://www.openwall.com/lists/oss-security/2024/06/17/3
- https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
- https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
- https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
- https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
- https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
- https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
- https://github.com/python/cpython/issues/113171
- https://github.com/python/cpython/pull/113179
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
- https://security.netapp.com/advisory/ntap-20240726-0004/
- https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
- https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.
CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-4032
- http://www.openwall.com/lists/oss-security/2024/06/17/3
- https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
- https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
- https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
- https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
- https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
- https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
- https://github.com/python/cpython/issues/113171
- https://github.com/python/cpython/pull/113179
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
- https://security.netapp.com/advisory/ntap-20240726-0004/
- https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
- https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
low severity
- Vulnerable module: python-lxml
- Introduced through: python-lxml@3.2.1-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-lxml@3.2.1-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-lxml package and not the python-lxml package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
Remediation
There is no fixed version for Centos:7 python-lxml.
References
- http://www.securityfocus.com/bid/67159
- http://advisories.mageia.org/MGASA-2014-0218.html
- http://lxml.de/3.3/changes-3.3.5.html
- https://access.redhat.com/security/cve/CVE-2014-3146
- http://www.debian.org/security/2014/dsa-2941
- http://seclists.org/fulldisclosure/2014/Apr/210
- http://seclists.org/fulldisclosure/2014/Apr/319
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:112
- https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.html
- http://www.openwall.com/lists/oss-security/2014/05/09/7
- http://secunia.com/advisories/58013
- http://secunia.com/advisories/58744
- http://secunia.com/advisories/59008
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html
- http://www.ubuntu.com/usn/USN-2217-1
low severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing failures or heap corruption.
Remediation
There is no fixed version for Centos:7 libssh2.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
Remediation
There is no fixed version for Centos:7 python.
References
- https://bugs.python.org/issue31530
- https://access.redhat.com/security/cve/CVE-2018-1000030
- https://security.gentoo.org/glsa/201811-02
- https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
- https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://usn.ubuntu.com/3817-1/
- https://usn.ubuntu.com/3817-2/
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://bugs.python.org/issue31530
- https://access.redhat.com/security/cve/CVE-2018-1000030
- https://security.gentoo.org/glsa/201811-02
- https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
- https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://usn.ubuntu.com/3817-1/
- https://usn.ubuntu.com/3817-2/
low severity
- Vulnerable module: shadow-utils
- Introduced through: shadow-utils@2:4.6-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › shadow-utils@2:4.6-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow-utils package and not the shadow-utils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
Remediation
There is no fixed version for Centos:7 shadow-utils.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- http://www.securityfocus.com/bid/99502
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://access.redhat.com/security/cve/CVE-2017-10989
- http://marc.info/?l=sqlite-users&m=149933696214713&w=2
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
- https://sqlite.org/src/info/66de6f4a
- https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
- https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
- http://www.securitytracker.com/id/1039427
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
- https://usn.ubuntu.com/4019-1/
- https://usn.ubuntu.com/4019-2/
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/91421
- https://github.com/libarchive/libarchive/issues/548
- https://access.redhat.com/security/cve/CVE-2015-8933
- http://www.debian.org/security/2016/dsa-3657
- https://security.gentoo.org/glsa/201701-03
- https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html
- http://www.openwall.com/lists/oss-security/2016/06/17/2
- http://www.openwall.com/lists/oss-security/2016/06/17/5
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html
- http://www.ubuntu.com/usn/USN-3033-1
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/91421
- https://github.com/libarchive/libarchive/issues/548
- https://access.redhat.com/security/cve/CVE-2015-8933
- http://www.debian.org/security/2016/dsa-3657
- https://security.gentoo.org/glsa/201701-03
- https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html
- http://www.openwall.com/lists/oss-security/2016/06/17/2
- http://www.openwall.com/lists/oss-security/2016/06/17/5
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html
- http://www.ubuntu.com/usn/USN-3033-1
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/98580
- https://access.redhat.com/security/cve/CVE-2017-9039
- https://security.gentoo.org/glsa/201709-02
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=82156ab704b08b124d319c0decdbd48b3ca2dac5
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-15025
- https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22186
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d8010d3e75ec7194a4703774090b27486b742d48
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/100532
- https://sourceware.org/bugzilla/show_bug.cgi?id=22018
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
- https://access.redhat.com/security/cve/CVE-2017-13757
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=90efb6422939ca031804266fba669f77c22a274a
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/100625
- https://sourceware.org/bugzilla/show_bug.cgi?id=22058
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
- https://access.redhat.com/security/cve/CVE-2017-14130
- https://security.gentoo.org/glsa/201801-01
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=2a143b99fc4a5094a9cf128f3184d8e6818c8229
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22113
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582
- https://access.redhat.com/security/cve/CVE-2017-14529
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4d465c689a8fb27212ef358d0aee89d60dee69a6
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dcaaca89e8618eba35193c27afcb1cfa54f74582
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
bfd_get_debug_link_info_1 in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to bfd_getl32.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-15021
- https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22197
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/100624
- https://sourceware.org/bugzilla/show_bug.cgi?id=22047
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
- https://access.redhat.com/security/cve/CVE-2017-14129
- https://security.gentoo.org/glsa/201801-01
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles a length calculation, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to read_1_byte.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101216
- https://access.redhat.com/security/cve/CVE-2017-14939
- https://www.exploit-db.com/exploits/42970/
- https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22169
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=515f23e63c0074ab531bc954f84ca40c6281a724
- https://www.exploit-db.com/exploits/42970
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/100623
- https://sourceware.org/bugzilla/show_bug.cgi?id=22059
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
- https://access.redhat.com/security/cve/CVE-2017-14128
- https://security.gentoo.org/glsa/201801-01
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles pointers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file, related to parse_die and parse_line_table, as demonstrated by a parse_die heap-based buffer over-read.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-15020
- https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22202
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-14729
- https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22170
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=56933f9e3e90eebf1018ed7417d6c1184b91db6b
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17124
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22507
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101941
- https://sourceware.org/bugzilla/show_bug.cgi?id=22384
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
- https://access.redhat.com/security/cve/CVE-2017-16830
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/98589
- https://access.redhat.com/security/cve/CVE-2017-9038
- https://security.gentoo.org/glsa/201709-02
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/98598
- https://access.redhat.com/security/cve/CVE-2017-9041
- https://security.gentoo.org/glsa/201709-02
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17126
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22510
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22376
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d
- https://access.redhat.com/security/cve/CVE-2017-16826
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17121
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22506
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/98591
- https://access.redhat.com/security/cve/CVE-2017-9043
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/109354
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://access.redhat.com/security/cve/CVE-2019-14250
- https://security.gentoo.org/glsa/202007-39
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-9042
- https://security.gentoo.org/glsa/201709-02
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22385
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
- https://access.redhat.com/security/cve/CVE-2017-16831
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22386
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
- https://access.redhat.com/security/cve/CVE-2017-16828
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22373
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b
- https://access.redhat.com/security/cve/CVE-2017-16832
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/106144
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://access.redhat.com/security/cve/CVE-2018-19932
- https://security.gentoo.org/glsa/201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23932
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=beab453223769279cc1cef68a1622ab8978641f7
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/102821
- https://sourceware.org/bugzilla/show_bug.cgi?id=22746
- https://access.redhat.com/security/cve/CVE-2018-6323
- https://www.exploit-db.com/exploits/44035/
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://www.exploit-db.com/exploits/44035
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101203
- https://sourceware.org/bugzilla/show_bug.cgi?id=22210
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
- https://access.redhat.com/security/cve/CVE-2017-14933
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
process_debug_info in dwarf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file that contains a negative size value in a CU structure.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101204
- https://sourceware.org/bugzilla/show_bug.cgi?id=22219
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b
- https://access.redhat.com/security/cve/CVE-2017-14934
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=19485196044b2521af979f1e5c4a89bfb90fba0b
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-3198
- https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
- https://vuldb.com/?ctiid.303151
- https://vuldb.com/?id.303151
- https://vuldb.com/?submit.545773
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=32716
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The setup_group function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a group section that is too small.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The bfd_make_section_with_flags function in section.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a NULL dereference via a crafted file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
scan_unit_for_symbols in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-14940
- https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22166
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0d76029f92182c3682d8be2c833d45bc9a2068fe
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101613
- https://access.redhat.com/security/cve/CVE-2017-15939
- https://security.gentoo.org/glsa/201801-01
- https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22205
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a54018b72d75abf2e74bf36016702da06399c1d9
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a54018b72d75abf2e74bf36016702da06399c1d9
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22163
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
- https://access.redhat.com/security/cve/CVE-2017-14974
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the DW_AT_name data type, which allows remote attackers to cause a denial of service (bfd_hash_hash NULL pointer dereference, or out-of-bounds access, and application crash) via a crafted ELF file, related to scan_unit_for_symbols and parse_comp_unit.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-15022
- https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22201
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11855d8a1f11b102a702ab76e95b22082cccf2f8
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101611
- https://access.redhat.com/security/cve/CVE-2017-15023
- https://security.gentoo.org/glsa/201801-01
- https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22200
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted COFF based file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17123
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22509
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a "member access within null pointer" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an "int main() {return 0;}" program.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/98579
- https://access.redhat.com/security/cve/CVE-2017-9040
- https://security.gentoo.org/glsa/201709-02
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/105754
- https://security.netapp.com/advisory/ntap-20190307-0003/
- https://access.redhat.com/security/cve/CVE-2018-18607
- https://sourceware.org/bugzilla/show_bug.cgi?id=23805
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=102def4da826b3d9e169741421e5e67e8731909a
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/105754
- https://security.netapp.com/advisory/ntap-20190307-0003/
- https://access.redhat.com/security/cve/CVE-2018-18606
- https://sourceware.org/bugzilla/show_bug.cgi?id=23806
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45a0eaf77022963d639d6d19871dbab7b79703fc
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in work_stuff_copy_to_from when called from iterate_demangle_function.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11412
- https://sourceware.org/bugzilla/attachment.cgi?id=16378
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
- https://vuldb.com/?ctiid.327348
- https://vuldb.com/?id.327348
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11495
- https://sourceware.org/bugzilla/attachment.cgi?id=16393
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
- https://vuldb.com/?ctiid.327620
- https://vuldb.com/?id.327620
- https://vuldb.com/?submit.668290
- https://www.gnu.org/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11414
- https://sourceware.org/bugzilla/attachment.cgi?id=16361
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
- https://vuldb.com/?ctiid.327350
- https://vuldb.com/?id.327350
- https://vuldb.com/?submit.665591
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33450
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11494
- https://sourceware.org/bugzilla/attachment.cgi?id=16389
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
- https://vuldb.com/?ctiid.327619
- https://vuldb.com/?id.327619
- https://vuldb.com/?submit.668281
- https://www.gnu.org/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be exploited. This patch is called 16357. It is best practice to apply a patch to resolve this issue.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-11840
- https://sourceware.org/bugzilla/attachment.cgi?id=16351
- https://sourceware.org/bugzilla/attachment.cgi?id=16357
- https://sourceware.org/bugzilla/show_bug.cgi?id=33455
- https://vuldb.com/?ctiid.328775
- https://vuldb.com/?id.328775
- https://vuldb.com/?submit.661281
- https://www.gnu.org/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101608
- https://sourceware.org/bugzilla/show_bug.cgi?id=22361
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
- https://access.redhat.com/security/cve/CVE-2017-15996
- https://security.gentoo.org/glsa/201801-01
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols, which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17125
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22443
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The print_insn_score32 function in opcodes/score7-dis.c:552 in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The process_otr function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not validate a certain offset, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The regs macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://security.netapp.com/advisory/ntap-20210129-0008/
- https://access.redhat.com/security/cve/CVE-2020-35448
- https://sourceware.org/bugzilla/show_bug.cgi?id=26574
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
- https://access.redhat.com/errata/RHSA-2021:4364
- https://security.gentoo.org/glsa/202107-24
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8642dafaef21aa6747cec01df1977e9c52eb4679
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function d_unqualified_name in file cp-demangle.c in BinUtils 2.26 allowing attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A buffer overflow vulnerability in function gnu_special in file cplus-dem.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function d_discriminator in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function d_abi_tags in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf_leb.c in libdwarf allows attackers to cause a denial of service (SIGSEGV).
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The evax_bfd_print_emh function in vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The nlm_swap_auxiliary_headers_in function in bfd/nlmcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted nlm file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_vms_save_sized_string function in vms-misc.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_xcoff_read_ar_hdr function in bfd/coff-rs6000.c and bfd/coff64-rs6000.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds stack read via a crafted COFF image file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The getsym function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a malformed tekhex binary.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22307
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163
- https://access.redhat.com/security/cve/CVE-2017-16829
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101610
- https://access.redhat.com/security/cve/CVE-2017-15938
- https://security.gentoo.org/glsa/201801-01
- https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22209
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1b86808a86077722ee4f42ff97f836b12420bb2a
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate sizes of core notes, which allows remote attackers to cause a denial of service (bfd_getl32 heap-based buffer over-read and application crash) via a crafted object file, related to elfcore_grok_netbsd_procinfo, elfcore_grok_openbsd_procinfo, and elfcore_grok_nto_status.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/103103
- https://sourceware.org/bugzilla/show_bug.cgi?id=22788
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
- https://access.redhat.com/security/cve/CVE-2018-6872
- https://security.gentoo.org/glsa/201811-17
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/105754
- https://security.netapp.com/advisory/ntap-20190307-0003/
- https://access.redhat.com/security/cve/CVE-2018-18605
- https://sourceware.org/bugzilla/show_bug.cgi?id=23804
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Memory leak in decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22204
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005
- https://access.redhat.com/security/cve/CVE-2017-14932
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e338894dc2e603683bed2172e8e9f25b29051005
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
_bfd_dwarf2_cleanup_debug_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory leak) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22212
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
- https://access.redhat.com/security/cve/CVE-2017-15225
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
_bfd_elf_slurp_version_tables in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/101212
- https://access.redhat.com/security/cve/CVE-2017-14938
- https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22166
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bd61e135492ecf624880e6b78e5fcde3c9716df6
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-17122
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22508
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/104539
- https://access.redhat.com/security/cve/CVE-2018-12698
- https://security.gentoo.org/glsa/201908-01
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _bfd_generic_read_minisymbols function in syms.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, has a memory leak via a crafted ELF file, leading to a denial of service (memory consumption), as demonstrated by nm.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/106142
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://support.f5.com/csp/article/K62602089
- https://access.redhat.com/security/cve/CVE-2018-20002
- https://security.gentoo.org/glsa/201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23952
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
- https://usn.ubuntu.com/4336-1/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
low severity
new
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
find_abstract_instance_name in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2017-15024
- https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
- https://sourceware.org/bugzilla/show_bug.cgi?id=22187
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22306
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419
- https://access.redhat.com/security/cve/CVE-2017-16827
- https://security.gentoo.org/glsa/201811-17
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/100347
- https://access.redhat.com/security/cve/CVE-2016-10349
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201710-19
- https://github.com/libarchive/libarchive/issues/834
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2017-14166
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/
- https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377926
- https://access.redhat.com/security/cve/CVE-2016-8687
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-stack-based-buffer-overflow-in-bsdtar_expand_char-util-c/
- https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://www.securitytracker.com/id/1037668
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
bsdcpio in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read and crash) via crafted cpio file.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- http://www.securityfocus.com/bid/91298
- https://access.redhat.com/security/cve/CVE-2015-8915
- https://security.gentoo.org/glsa/201701-03
- https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html
- https://github.com/libarchive/libarchive/issues/503
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/06/17/2
- http://www.openwall.com/lists/oss-security/2016/06/17/5
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
- https://access.redhat.com/security/cve/CVE-2017-14501
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://bugs.debian.org/875966
- https://github.com/libarchive/libarchive/issues/949
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
Remediation
There is no fixed version for Centos:7 cairo.
References
- https://access.redhat.com/security/cve/CVE-2017-7475
- https://bugs.freedesktop.org/show_bug.cgi?id=100763
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
- http://seclists.org/oss-sec/2017/q2/151
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: cairo
- Introduced through: cairo@1.15.12-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cairo@1.15.12-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cairo package and not the cairo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.
Remediation
There is no fixed version for Centos:7 cairo.
References
- https://access.redhat.com/security/cve/CVE-2017-9814
- https://security.gentoo.org/glsa/201904-01
- https://bugs.freedesktop.org/show_bug.cgi?id=101547
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
Remediation
There is no fixed version for Centos:7 curl.
References
- http://www.securityfocus.com/bid/94106
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
- https://curl.haxx.se/CVE-2016-8623.patch
- https://curl.haxx.se/docs/adv_20161102I.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8623
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
Remediation
There is no fixed version for Centos:7 dbus.
References
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://access.redhat.com/security/cve/CVE-2015-0245
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
low severity
- Vulnerable module: dbus-libs
- Introduced through: dbus-libs@1:1.10.24-14.el7_8
Detailed paths
-
Introduced through: jboss/base-jdk@8 › dbus-libs@1:1.10.24-14.el7_8
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus-libs package and not the dbus-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
Remediation
There is no fixed version for Centos:7 dbus-libs.
References
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://access.redhat.com/security/cve/CVE-2015-0245
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2017-7610
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2017-7612
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2017-7611
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- http://www.securityfocus.com/bid/98609
- https://access.redhat.com/security/cve/CVE-2017-7608
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- http://www.securityfocus.com/bid/98608
- https://access.redhat.com/security/cve/CVE-2017-7607
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2017-7613
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2017-7609
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1387584
- https://access.redhat.com/security/cve/CVE-2016-10255
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
- http://www.openwall.com/lists/oss-security/2017/03/22/1
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
low severity
- Vulnerable module: elfutils-default-yama-scope
- Introduced through: elfutils-default-yama-scope@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-default-yama-scope@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-default-yama-scope package and not the elfutils-default-yama-scope package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-default-yama-scope.
References
- https://access.redhat.com/security/cve/CVE-2016-10254
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
- http://www.openwall.com/lists/oss-security/2017/03/22/2
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2017-7612
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2017-7611
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2017-7610
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- http://www.securityfocus.com/bid/98609
- https://access.redhat.com/security/cve/CVE-2017-7608
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- http://www.securityfocus.com/bid/98608
- https://access.redhat.com/security/cve/CVE-2017-7607
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2017-7609
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2017-7613
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://access.redhat.com/security/cve/CVE-2016-10254
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
- http://www.openwall.com/lists/oss-security/2017/03/22/2
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
low severity
- Vulnerable module: elfutils-libelf
- Introduced through: elfutils-libelf@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libelf@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf package and not the elfutils-libelf package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-libelf.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1387584
- https://access.redhat.com/security/cve/CVE-2016-10255
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
- http://www.openwall.com/lists/oss-security/2017/03/22/1
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- http://www.securityfocus.com/bid/98609
- https://access.redhat.com/security/cve/CVE-2017-7608
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7612
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- http://www.securityfocus.com/bid/98608
- https://access.redhat.com/security/cve/CVE-2017-7607
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7611
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7610
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7609
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-7613
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://usn.ubuntu.com/3670-1/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://access.redhat.com/security/cve/CVE-2016-10254
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
- http://www.openwall.com/lists/oss-security/2017/03/22/2
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
low severity
- Vulnerable module: elfutils-libs
- Introduced through: elfutils-libs@0.176-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › elfutils-libs@0.176-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libs package and not the elfutils-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 elfutils-libs.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1387584
- https://access.redhat.com/security/cve/CVE-2016-10255
- https://security.gentoo.org/glsa/201710-10
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
- https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
- http://www.openwall.com/lists/oss-security/2017/03/22/1
- https://usn.ubuntu.com/3670-1/
- https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
low severity
- Vulnerable module: file-libs
- Introduced through: file-libs@5.11-36.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › file-libs@5.11-36.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream file-libs package and not the file-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
Remediation
There is no fixed version for Centos:7 file-libs.
References
- http://www.securityfocus.com/bid/71715
- http://advisories.mageia.org/MGASA-2015-0040.html
- https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2014-9620
- http://www.debian.org/security/2015/dsa-3121
- https://security.gentoo.org/glsa/201503-08
- http://mx.gw.com/pipermail/file/2014/001653.html
- http://mx.gw.com/pipermail/file/2015/001660.html
- http://www.openwall.com/lists/oss-security/2015/01/17/9
- http://rhn.redhat.com/errata/RHSA-2016-0760.html
- https://access.redhat.com/errata/RHSA-2016:0760
- https://usn.ubuntu.com/3686-1/
low severity
- Vulnerable module: freetype
- Introduced through: freetype@2.8-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › freetype@2.8-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream freetype package and not the freetype package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
Remediation
There is no fixed version for Centos:7 freetype.
References
- https://access.redhat.com/security/cve/CVE-2018-6942
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
- https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html
- https://usn.ubuntu.com/3572-1/
low severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the GIF parser of GdkPixbuf’s LZW decoder. When an invalid symbol is encountered during decompression, the decoder sets the reported output size to the full buffer length rather than the actual number of written bytes. This logic error results in uninitialized sections of the buffer being included in the output, potentially leaking arbitrary memory contents in the processed image.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
low severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- http://www.securityfocus.com/bid/96779
- https://access.redhat.com/security/cve/CVE-2017-6314
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
- https://security.gentoo.org/glsa/201709-08
- http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
- https://bugzilla.gnome.org/show_bug.cgi?id=779020
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- http://www.openwall.com/lists/oss-security/2017/02/21/4
- http://www.openwall.com/lists/oss-security/2017/02/26/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
low severity
- Vulnerable module: gdk-pixbuf2
- Introduced through: gdk-pixbuf2@2.36.12-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gdk-pixbuf2@2.36.12-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream gdk-pixbuf2 package and not the gdk-pixbuf2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.
Remediation
There is no fixed version for Centos:7 gdk-pixbuf2.
References
- http://www.securityfocus.com/bid/96779
- https://access.redhat.com/security/cve/CVE-2017-6312
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
- https://security.gentoo.org/glsa/201709-08
- http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
- https://bugzilla.gnome.org/show_bug.cgi?id=779012
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- http://www.openwall.com/lists/oss-security/2017/02/21/4
- http://www.openwall.com/lists/oss-security/2017/02/26/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
low severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glib2@2.56.1-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Remediation
There is no fixed version for Centos:7 glib2.
References
- http://www.securityfocus.com/bid/99575
- https://access.redhat.com/security/cve/CVE-2017-11164
- http://openwall.com/lists/oss-security/2017/07/11/3
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://www.openwall.com/lists/oss-security/2023/04/11/1
- http://www.openwall.com/lists/oss-security/2023/04/12/1
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
Remediation
There is no fixed version for Centos:7 glibc.
References
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/96525
- http://openwall.com/lists/oss-security/2017/03/01/10
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://access.redhat.com/security/cve/CVE-2016-10228
- https://security.gentoo.org/glsa/202101-20
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1585
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
Remediation
There is no fixed version for Centos:7 glibc.
References
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/96525
- http://openwall.com/lists/oss-security/2017/03/01/10
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://access.redhat.com/security/cve/CVE-2016-10228
- https://security.gentoo.org/glsa/202101-20
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://access.redhat.com/errata/RHSA-2021:1585
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
Remediation
There is no fixed version for Centos:7 glibc-common.
References
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/93839
- https://bugzilla.redhat.com/show_bug.cgi?id=1388880
- https://access.redhat.com/security/cve/CVE-2016-8886
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/
- https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c
- http://www.openwall.com/lists/oss-security/2016/10/23/2
- http://www.openwall.com/lists/oss-security/2016/10/25/11
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-14132
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://github.com/mdadams/jasper/issues/147
- https://lists.debian.org/debian-lts-announce/2018/11/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer overflow of size 1 in the function jas_icctxtdesc_input in libjasper/base/jas_icc.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-19540
- https://github.com/mdadams/jasper/issues/182
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function jp2_decode in libjasper/jp2/jp2_dec.c, leading to a denial of service.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- https://access.redhat.com/security/cve/CVE-2018-19543
- https://github.com/mdadams/jasper/issues/182
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jpc_dequantize function in jpc_dec.c in JasPer 1.900.13 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/94373
- https://bugzilla.redhat.com/show_bug.cgi?id=1396979
- https://access.redhat.com/security/cve/CVE-2016-9397
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
- http://www.openwall.com/lists/oss-security/2016/11/17/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/94382
- https://bugzilla.redhat.com/show_bug.cgi?id=1396980
- https://access.redhat.com/security/cve/CVE-2016-9398
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
- http://www.openwall.com/lists/oss-security/2016/11/17/1
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function jpc_floorlog2() in jpc/jpc_math.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://access.redhat.com/security/cve/CVE-2017-13747
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485282
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function jpc_dequantize() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://access.redhat.com/security/cve/CVE-2017-13752
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485276
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function jpc_pi_nextrpcl() in jpc/jpc_t2cod.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://access.redhat.com/security/cve/CVE-2017-13749
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485285
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function calcstepsizes() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/100514
- https://access.redhat.com/security/cve/CVE-2017-13751
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://security.gentoo.org/glsa/201908-03
- https://bugzilla.redhat.com/show_bug.cgi?id=1485283
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/105956
- https://access.redhat.com/security/cve/CVE-2018-19139
- https://github.com/mdadams/jasper/issues/188
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
low severity
- Vulnerable module: jasper-libs
- Introduced through: jasper-libs@1.900.1-33.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › jasper-libs@1.900.1-33.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream jasper-libs package and not the jasper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
JasPer 2.0.14 has a memory leak in base/jas_malloc.c in libjasper.a when "--output-format jp2" is used.
Remediation
There is no fixed version for Centos:7 jasper-libs.
References
- http://www.securityfocus.com/bid/106373
- https://access.redhat.com/security/cve/CVE-2018-20622
- https://github.com/mdadams/jasper/issues/193
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/100347
- https://access.redhat.com/security/cve/CVE-2016-10349
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201710-19
- https://github.com/libarchive/libarchive/issues/834
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2017-14166
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/
- https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/93781
- https://bugzilla.redhat.com/show_bug.cgi?id=1377926
- https://access.redhat.com/security/cve/CVE-2016-8687
- https://security.gentoo.org/glsa/201701-03
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-stack-based-buffer-overflow-in-bsdtar_expand_char-util-c/
- https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/10/16/11
- http://www.securitytracker.com/id/1037668
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
bsdcpio in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read and crash) via crafted cpio file.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- http://www.securityfocus.com/bid/91298
- https://access.redhat.com/security/cve/CVE-2015-8915
- https://security.gentoo.org/glsa/201701-03
- https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html
- https://github.com/libarchive/libarchive/issues/503
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- http://www.openwall.com/lists/oss-security/2016/06/17/2
- http://www.openwall.com/lists/oss-security/2016/06/17/5
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.
Remediation
There is no fixed version for Centos:7 libarchive.
References
- https://access.redhat.com/security/cve/CVE-2017-14501
- https://www.debian.org/security/2018/dsa-4360
- https://security.gentoo.org/glsa/201908-11
- https://bugs.debian.org/875966
- https://github.com/libarchive/libarchive/issues/949
- https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
- https://access.redhat.com/errata/RHEA-2021:1580
- https://usn.ubuntu.com/3736-1/
low severity
- Vulnerable module: libcap
- Introduced through: libcap@2.22-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcap@2.22-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcap package and not the libcap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
Remediation
There is no fixed version for Centos:7 libcap.
References
- https://access.redhat.com/security/cve/CVE-2023-2602
- https://bugzilla.redhat.com/show_bug.cgi?id=2209114
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- http://www.securityfocus.com/bid/94106
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
- https://curl.haxx.se/CVE-2016-8623.patch
- https://curl.haxx.se/docs/adv_20161102I.html
- https://www.tenable.com/security/tns-2016-21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/security/cve/CVE-2016-8623
- https://security.gentoo.org/glsa/201701-47
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2486
- https://access.redhat.com/errata/RHSA-2018:3558
- http://www.securitytracker.com/id/1037192
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libdb
- Introduced through: libdb@5.3.21-25.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libdb@5.3.21-25.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libdb package and not the libdb package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are Prior to 6.138, prior to 6.2.38 and prior to 18.1.32. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Data Store. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
Remediation
There is no fixed version for Centos:7 libdb.
References
- https://access.redhat.com/security/cve/CVE-2019-2708
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2021:1675
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
low severity
- Vulnerable module: libdb-utils
- Introduced through: libdb-utils@5.3.21-25.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libdb-utils@5.3.21-25.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libdb-utils package and not the libdb-utils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are Prior to 6.138, prior to 6.2.38 and prior to 18.1.32. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Data Store. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
Remediation
There is no fixed version for Centos:7 libdb-utils.
References
- https://access.redhat.com/security/cve/CVE-2019-2708
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2021:1675
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 libgcc.
References
- http://www.securityfocus.com/bid/109354
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://access.redhat.com/security/cve/CVE-2019-14250
- https://security.gentoo.org/glsa/202007-39
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libidn
- Introduced through: libidn@1.28-4.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libidn@1.28-4.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libidn package and not the libidn package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
Remediation
There is no fixed version for Centos:7 libidn.
References
low severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file.
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
low severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
- http://www.securityfocus.com/bid/71326
- https://bugzilla.redhat.com/show_bug.cgi?id=1169845
- https://access.redhat.com/security/cve/CVE-2014-9092
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147315.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147336.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150957.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150967.html
- https://tapani.tarvainen.info/linux/convertbug/
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26482&sid=81658bc2f51a8d9893279cd01e83783f
- http://www.openwall.com/lists/oss-security/2014/11/26/8
- https://usn.ubuntu.com/3706-1/
- https://usn.ubuntu.com/3706-2/
low severity
- Vulnerable module: libjpeg-turbo
- Introduced through: libjpeg-turbo@1.2.90-8.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libjpeg-turbo@1.2.90-8.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libjpeg-turbo package and not the libjpeg-turbo package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The fill_input_buffer function in jdatasrc.c in libjpeg-turbo 1.5.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted jpg file. NOTE: Maintainer asserts the issue is due to a bug in downstream code caused by misuse of the libjpeg API
Remediation
There is no fixed version for Centos:7 libjpeg-turbo.
References
- https://access.redhat.com/security/cve/CVE-2017-9614
- https://www.exploit-db.com/exploits/42391/
- http://seclists.org/fulldisclosure/2017/Jul/66
- http://packetstormsecurity.com/files/143518/libjpeg-turbo-1.5.1-Denial-Of-Service.html
- https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167
- https://www.exploit-db.com/exploits/42391
low severity
- Vulnerable module: libpng
- Introduced through: libpng@2:1.5.13-7.el7_2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libpng@2:1.5.13-7.el7_2
NVD Description
Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
Remediation
There is no fixed version for Centos:7 libpng.
References
- http://www.securityfocus.com/bid/95157
- https://access.redhat.com/security/cve/CVE-2016-10087
- https://security.gentoo.org/glsa/201701-74
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/12/29/2
- http://www.openwall.com/lists/oss-security/2016/12/30/4
- https://usn.ubuntu.com/3712-1/
- https://usn.ubuntu.com/3712-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
- http://www.securityfocus.com/bid/109354
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://access.redhat.com/security/cve/CVE-2019-14250
- https://security.gentoo.org/glsa/202007-39
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
Remediation
There is no fixed version for Centos:7 libstdc++.
References
low severity
- Vulnerable module: libtasn1
- Introduced through: libtasn1@4.10-1.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtasn1@4.10-1.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1 package and not the libtasn1 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtasn1.
References
- https://access.redhat.com/security/cve/CVE-2017-10790
- https://www.debian.org/security/2018/dsa-4106
- https://security.gentoo.org/glsa/201710-11
- https://bugzilla.redhat.com/show_bug.cgi?id=1464141
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
- https://usn.ubuntu.com/3547-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97117
- https://access.redhat.com/security/cve/CVE-2016-10267
- http://www.debian.org/security/2017/dsa-3844
- https://security.gentoo.org/glsa/201709-27
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero
- https://github.com/vadz/libtiff/commit/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97115
- https://access.redhat.com/security/cve/CVE-2016-10266
- http://www.debian.org/security/2017/dsa-3844
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero
- https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97501
- https://access.redhat.com/security/cve/CVE-2017-7595
- http://www.debian.org/security/2017/dsa-3844
- https://security.gentoo.org/glsa/201709-27
- https://blogs.gentoo.org/ago/2017/04/01/libtiff-divide-by-zero-in-jpegsetupencode-tiff_jpeg-c
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97200
- https://access.redhat.com/security/cve/CVE-2016-10270
- http://www.debian.org/security/2017/dsa-3844
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- https://github.com/vadz/libtiff/commit/9a72a69e035ee70ff5c41541c8c61cd97990d018
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97201
- https://access.redhat.com/security/cve/CVE-2016-10269
- http://www.debian.org/security/2017/dsa-3844
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10269
- https://github.com/vadz/libtiff/commit/1044b43637fa7f70fb19b93593777b78bd20da86
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF before 4.0.6 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/99304
- https://access.redhat.com/security/cve/CVE-2017-9937
- http://bugzilla.maptools.org/show_bug.cgi?id=2707
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.8, there is a assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function in tif_dirwrite.c. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tif_dirread.c in LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97505
- http://www.securityfocus.com/bid/97508
- https://access.redhat.com/security/cve/CVE-2017-7599
- http://www.debian.org/security/2017/dsa-3844
- https://security.gentoo.org/glsa/201709-27
- https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/94419
- http://bugzilla.maptools.org/show_bug.cgi?id=2590
- https://access.redhat.com/security/cve/CVE-2016-9297
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/11/12/2
- http://www.openwall.com/lists/oss-security/2016/11/14/7
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2017-16232
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
- http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
- http://seclists.org/fulldisclosure/2018/Dec/32
- http://seclists.org/fulldisclosure/2018/Dec/47
- http://www.openwall.com/lists/oss-security/2017/11/01/11
- http://www.openwall.com/lists/oss-security/2017/11/01/3
- http://www.openwall.com/lists/oss-security/2017/11/01/7
- http://www.openwall.com/lists/oss-security/2017/11/01/8
- http://www.securityfocus.com/bid/101696
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/97202
- https://access.redhat.com/security/cve/CVE-2016-10268
- https://security.gentoo.org/glsa/201709-27
- https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
- https://github.com/vadz/libtiff/commit/5397a417e61258c69209904e652a1f409ec3b9df
- https://usn.ubuntu.com/3602-1/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Integer overflow in the writeBufferToSeparateStrips function in tiffcrop.c in LibTIFF before 4.0.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tif file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/94424
- http://bugzilla.maptools.org/show_bug.cgi?id=2592
- https://bugzilla.redhat.com/show_bug.cgi?id=1397726
- https://access.redhat.com/security/cve/CVE-2016-9532
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/11/11/14
- http://www.openwall.com/lists/oss-security/2016/11/21/1
- http://www.openwall.com/lists/oss-security/2016/11/22/1
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The exploit has been published and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. A researcher disputes the security impact of this issue, because "this is a memory leak on a command line tool that is about to exit anyway". In the reply the project maintainer declares this issue as "a simple 'bug' when leaving the command line tool and (...) not a security issue at all".
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2025-9165
- http://www.libtiff.org/
- https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing
- https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0
- https://gitlab.com/libtiff/libtiff/-/issues/728
- https://gitlab.com/libtiff/libtiff/-/merge_requests/747
- https://vuldb.com/?ctiid.320543
- https://vuldb.com/?id.320543
- https://vuldb.com/?submit.630506
- https://vuldb.com/?submit.630507
- https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.7, a memory leak vulnerability was found in the function TIFFReadDirEntryLong8Array in tif_dirread.c, which allows attackers to cause a denial of service via a crafted file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/105932
- https://seclists.org/bugtraq/2019/Nov/5
- https://access.redhat.com/security/cve/CVE-2018-19210
- https://www.debian.org/security/2020/dsa-4670
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6IL2QFKE6MGVUTOPU2UUWITTE36KRDF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TX5UEYHGMTNEHJB4FHE7HCJ75UQDNKGB/
- https://security.gentoo.org/glsa/202003-25
- http://bugzilla.maptools.org/show_bug.cgi?id=2820
- http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
- https://lists.debian.org/debian-lts-announce/2019/02/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html
- https://usn.ubuntu.com/3906-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C6IL2QFKE6MGVUTOPU2UUWITTE36KRDF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TX5UEYHGMTNEHJB4FHE7HCJ75UQDNKGB/
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A weakness has been identified in LibTIFF 4.7.0. This affects the function main of the file tiffcrop.c of the component tiffcrop. Executing manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been made available to the public and could be exploited.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2025-8961
- http://www.libtiff.org/
- https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing
- https://gitlab.com/libtiff/libtiff/-/issues/721
- https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960
- https://vuldb.com/?ctiid.319955
- https://vuldb.com/?id.319955
- https://vuldb.com/?submit.627957
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- http://www.securityfocus.com/bid/94271
- http://bugzilla.maptools.org/show_bug.cgi?id=2587
- https://access.redhat.com/security/cve/CVE-2016-9273
- http://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.openwall.com/lists/oss-security/2016/11/09/20
- http://www.openwall.com/lists/oss-security/2016/11/11/6
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The TIFFWriteDirectoryTagCheckedRational function in tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is a reachable assertion abort in the function TIFFWriteDirectoryTagSubifd() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.7, the TIFFReadDirEntryLong8Array function in libtiff/tif_dirread.c mishandles a malloc operation, which allows attackers to cause a denial of service (memory leak within the function _TIFFmalloc in tif_unix.c) via a crafted file.
Remediation
There is no fixed version for Centos:7 libtiff.
References
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef
- https://access.redhat.com/security/cve/CVE-2018-5784
- https://www.debian.org/security/2018/dsa-4349
- http://bugzilla.maptools.org/show_bug.cgi?id=2772
- https://lists.debian.org/debian-lts-announce/2018/05/msg00022.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html
- https://usn.ubuntu.com/3602-1/
- https://usn.ubuntu.com/3606-1/
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses.
References
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13728
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484274
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses.
References
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13730
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484284
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13732
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484287
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13731
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484285
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13729
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484276
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- https://access.redhat.com/security/cve/CVE-2017-13733
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484290
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13728
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484274
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13729
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484276
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13730
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484284
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13733
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484290
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13732
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484287
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- https://access.redhat.com/security/cve/CVE-2017-13731
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484285
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13728
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484274
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13731
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484285
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13732
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484287
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13730
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484284
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13729
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484276
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- https://access.redhat.com/security/cve/CVE-2017-13733
- https://security.gentoo.org/glsa/201804-13
- https://bugzilla.redhat.com/show_bug.cgi?id=1484290
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-19.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openssl-libs@1:1.0.2k-19.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. OpenSSL does not class this issue as a security vulnerability. The trusted CA store should not contain anything that the user does not trust to issue other certificates. Notes: https://github.com/openssl/openssl/issues/5236#issuecomment-119646061
Remediation
There is no fixed version for Centos:7 openssl-libs.
References
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/76157
- http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1537
- https://bugzilla.redhat.com/show_bug.cgi?id=1187225
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
- https://access.redhat.com/security/cve/CVE-2015-8382
- http://www.openwall.com/lists/oss-security/2015/08/04/3
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834
low severity
- Vulnerable module: pcre
- Introduced through: pcre@8.32-17.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › pcre@8.32-17.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre package and not the pcre package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Remediation
There is no fixed version for Centos:7 pcre.
References
- http://www.securityfocus.com/bid/99575
- https://access.redhat.com/security/cve/CVE-2017-11164
- http://openwall.com/lists/oss-security/2017/07/11/3
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://www.openwall.com/lists/oss-security/2023/04/11/1
- http://www.openwall.com/lists/oss-security/2023/04/12/1
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: procps-ng
- Introduced through: procps-ng@3.3.10-27.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › procps-ng@3.3.10-27.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream procps-ng package and not the procps-ng package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Remediation
There is no fixed version for Centos:7 procps-ng.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where sqlite3_step(pStmt)==SQLITE_ROW is false and a data structure is never initialized.
Remediation
There is no fixed version for Centos:7 sqlite.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file.
Remediation
There is no fixed version for Centos:7 sqlite.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- http://www.securityfocus.com/bid/103466
- https://access.redhat.com/security/cve/CVE-2018-8740
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
- https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
- https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
- https://usn.ubuntu.com/4205-1/
- https://usn.ubuntu.com/4394-1/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
low severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 tar.
References
low severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
Remediation
There is no fixed version for Centos:7 tar.
References
- https://access.redhat.com/security/cve/CVE-2019-9923
- http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
- http://savannah.gnu.org/bugs/?55369
- https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: tar
- Introduced through: tar@2:1.26-35.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › tar@2:1.26-35.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.
Remediation
There is no fixed version for Centos:7 tar.
References
- https://access.redhat.com/security/cve/CVE-2023-39804
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058079
- https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4
- https://git.savannah.gnu.org/cgit/tar.git/tree/src/xheader.c?h=release_1_34#n1723
- https://lists.debian.org/debian-lts-announce/2024/03/msg00008.html
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Remediation
There is no fixed version for Centos:7 unzip.
References
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
Remediation
There is no fixed version for Centos:7 unzip.
References
- http://www.securityfocus.com/bid/95081
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://access.redhat.com/security/cve/CVE-2014-9913
- http://www.openwall.com/lists/oss-security/2014/11/03/5
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
low severity
- Vulnerable module: unzip
- Introduced through: unzip@6.0-21.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › unzip@6.0-21.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream unzip package and not the unzip package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
Remediation
There is no fixed version for Centos:7 unzip.
References
- http://www.securityfocus.com/bid/94728
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://access.redhat.com/security/cve/CVE-2016-9844
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2208
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/cd38bb4d83c942c4bad596835c6766cbf32e5195
- https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2231
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/79481367a457951aabd9501b510fd7e3eb29c3d8
- https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2183
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa
- https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
- https://security.gentoo.org/glsa/202208-32
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2023-5535
- https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
- https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers Buf* autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2024-43374
- https://github.com/vim/vim/commit/0a6e57b09bc8c76691b367a5babfb79b31b770e8
- https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw
- http://www.openwall.com/lists/oss-security/2024/08/15/6
- https://security.netapp.com/advisory/ntap-20240920-0004/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://access.redhat.com/security/cve/CVE-2025-1153
- https://sourceware.org/bugzilla/show_bug.cgi?id=32603
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
- https://vuldb.com/?ctiid.295057
- https://vuldb.com/?id.295057
- https://vuldb.com/?submit.489991
- https://www.gnu.org/
- https://security.netapp.com/advisory/ntap-20250404-0005/
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2022-35252
- http://seclists.org/fulldisclosure/2023/Jan/20
- http://seclists.org/fulldisclosure/2023/Jan/21
- https://hackerone.com/reports/1613943
- https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220930-0005/
- https://support.apple.com/kb/HT213603
- https://support.apple.com/kb/HT213604
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://access.redhat.com/security/cve/CVE-2021-22898
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
- https://curl.se/docs/CVE-2021-22898.html
- https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
- https://hackerone.com/reports/1176461
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
- http://www.openwall.com/lists/oss-security/2021/07/21/4
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
Remediation
There is no fixed version for Centos:7 curl.
References
- https://security.netapp.com/advisory/ntap-20210902-0003/
- https://support.apple.com/kb/HT212804
- https://support.apple.com/kb/HT212805
- https://access.redhat.com/security/cve/CVE-2021-22925
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- http://seclists.org/fulldisclosure/2021/Sep/39
- http://seclists.org/fulldisclosure/2021/Sep/40
- https://hackerone.com/reports/1223882
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://security.gentoo.org/glsa/202212-01
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2022-35252
- http://seclists.org/fulldisclosure/2023/Jan/20
- http://seclists.org/fulldisclosure/2023/Jan/21
- https://hackerone.com/reports/1613943
- https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
- https://security.gentoo.org/glsa/202212-01
- https://security.netapp.com/advisory/ntap-20220930-0005/
- https://support.apple.com/kb/HT213603
- https://support.apple.com/kb/HT213604
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://access.redhat.com/security/cve/CVE-2021-22898
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
- https://curl.se/docs/CVE-2021-22898.html
- https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
- https://hackerone.com/reports/1176461
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
- http://www.openwall.com/lists/oss-security/2021/07/21/4
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
- https://www.debian.org/security/2022/dsa-5197
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
Remediation
There is no fixed version for Centos:7 libcurl.
References
- https://security.netapp.com/advisory/ntap-20210902-0003/
- https://support.apple.com/kb/HT212804
- https://support.apple.com/kb/HT212805
- https://access.redhat.com/security/cve/CVE-2021-22925
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- http://seclists.org/fulldisclosure/2021/Sep/39
- http://seclists.org/fulldisclosure/2021/Sep/40
- https://hackerone.com/reports/1223882
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://access.redhat.com/errata/RHSA-2021:4511
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
- https://security.gentoo.org/glsa/202212-01
- https://www.oracle.com/security-alerts/cpujan2022.html
low severity
- Vulnerable module: libssh2
- Introduced through: libssh2@1.8.0-3.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libssh2@1.8.0-3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh2 package and not the libssh2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.
Remediation
There is no fixed version for Centos:7 libssh2.
References
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.
Remediation
There is no fixed version for Centos:7 libxml2.
References
- https://access.redhat.com/security/cve/CVE-2025-27113
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
- https://security.netapp.com/advisory/ntap-20250306-0004/
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/11
- http://seclists.org/fulldisclosure/2025/Apr/12
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/8
- http://seclists.org/fulldisclosure/2025/Apr/9
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
- https://access.redhat.com/security/cve/CVE-2025-27113
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
- https://security.netapp.com/advisory/ntap-20250306-0004/
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/11
- http://seclists.org/fulldisclosure/2025/Apr/12
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/8
- http://seclists.org/fulldisclosure/2025/Apr/9
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
low severity
- Vulnerable module: libxslt
- Introduced through: libxslt@1.1.28-5.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxslt@1.1.28-5.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt package and not the libxslt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.
Remediation
There is no fixed version for Centos:7 libxslt.
References
low severity
- Vulnerable module: nss
- Introduced through: nss@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss package and not the nss package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
Remediation
There is no fixed version for Centos:7 nss.
References
low severity
- Vulnerable module: nss-sysinit
- Introduced through: nss-sysinit@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-sysinit@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-sysinit package and not the nss-sysinit package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
Remediation
There is no fixed version for Centos:7 nss-sysinit.
References
low severity
- Vulnerable module: nss-tools
- Introduced through: nss-tools@3.44.0-7.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › nss-tools@3.44.0-7.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss-tools package and not the nss-tools package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
Remediation
There is no fixed version for Centos:7 nss-tools.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2025-1795
- https://github.com/python/cpython/issues/100884
- https://github.com/python/cpython/pull/100885
- https://github.com/python/cpython/pull/119099
- https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
- https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
- https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
- https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
- https://github.com/python/cpython/commit/a4ef689ce670684ec132204b1cd03720c8e0a03d
- https://github.com/python/cpython/commit/d4df3c55e4c5513947f907f24766b34d2ae8c090
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2025-1795
- https://github.com/python/cpython/issues/100884
- https://github.com/python/cpython/pull/100885
- https://github.com/python/cpython/pull/119099
- https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
- https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
- https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
- https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
- https://github.com/python/cpython/commit/a4ef689ce670684ec132204b1cd03720c8e0a03d
- https://github.com/python/cpython/commit/d4df3c55e4c5513947f907f24766b34d2ae8c090
- https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
low severity
- Vulnerable module: rpm
- Introduced through: rpm@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm package and not the rpm package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 rpm.
References
- https://access.redhat.com/security/cve/CVE-2021-20266
- https://bugzilla.redhat.com/show_bug.cgi?id=1927741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://access.redhat.com/errata/RHSA-2021:4489
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://security.gentoo.org/glsa/202107-43
low severity
- Vulnerable module: rpm-build-libs
- Introduced through: rpm-build-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-build-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-build-libs package and not the rpm-build-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 rpm-build-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-20266
- https://bugzilla.redhat.com/show_bug.cgi?id=1927741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://access.redhat.com/errata/RHSA-2021:4489
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://security.gentoo.org/glsa/202107-43
low severity
- Vulnerable module: rpm-libs
- Introduced through: rpm-libs@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-libs@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-libs package and not the rpm-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 rpm-libs.
References
- https://access.redhat.com/security/cve/CVE-2021-20266
- https://bugzilla.redhat.com/show_bug.cgi?id=1927741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://access.redhat.com/errata/RHSA-2021:4489
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://security.gentoo.org/glsa/202107-43
low severity
- Vulnerable module: rpm-python
- Introduced through: rpm-python@4.11.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › rpm-python@4.11.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream rpm-python package and not the rpm-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
Remediation
There is no fixed version for Centos:7 rpm-python.
References
- https://access.redhat.com/security/cve/CVE-2021-20266
- https://bugzilla.redhat.com/show_bug.cgi?id=1927741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://access.redhat.com/errata/RHSA-2021:4489
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://security.gentoo.org/glsa/202107-43
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.
Remediation
There is no fixed version for Centos:7 binutils.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=18750
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
- https://access.redhat.com/security/cve/CVE-2014-9939
- http://www.openwall.com/lists/oss-security/2015/07/31/6
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
low severity
- Vulnerable module: expat
- Introduced through: expat@2.1.0-11.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › expat@2.1.0-11.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
Remediation
There is no fixed version for Centos:7 expat.
References
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
- Fixed in: 0:2.17-317.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
Remediation
Upgrade Centos:7 glibc to version 0:2.17-317.el7 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-19126
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25204
- https://access.redhat.com/errata/RHSA-2020:3861
- https://usn.ubuntu.com/4416-1/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/72789
- https://sourceware.org/bugzilla/show_bug.cgi?id=18032
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
- https://access.redhat.com/security/cve/CVE-2015-8984
- https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
- http://www.openwall.com/lists/oss-security/2015/02/26/5
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
- Fixed in: 0:2.17-317.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
Remediation
Upgrade Centos:7 glibc-common to version 0:2.17-317.el7 or higher.
References
- https://access.redhat.com/security/cve/CVE-2019-19126
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25204
- https://access.redhat.com/errata/RHSA-2020:3861
- https://usn.ubuntu.com/4416-1/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/72789
- https://sourceware.org/bugzilla/show_bug.cgi?id=18032
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
- https://access.redhat.com/security/cve/CVE-2015-8984
- https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
- http://www.openwall.com/lists/oss-security/2015/02/26/5
- http://www.openwall.com/lists/oss-security/2017/02/14/9
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://access.redhat.com/security/cve/CVE-2015-1607
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392
- https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
- http://www.openwall.com/lists/oss-security/2015/02/13/14
- http://www.openwall.com/lists/oss-security/2015/02/14/6
- http://www.securityfocus.com/bid/72610
- http://www.ubuntu.com/usn/usn-2554-1/
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=2183683bd633818dd031b090b5530951de76f392
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://access.redhat.com/security/cve/CVE-2014-3591
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
- http://www.cs.tau.ac.il/~tromer/radioexp/
- http://www.debian.org/security/2015/dsa-3184
- http://www.debian.org/security/2015/dsa-3185
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
- https://access.redhat.com/security/cve/CVE-2015-0837
- https://ieeexplore.ieee.org/document/7163050
- http://www.debian.org/security/2015/dsa-3184
- http://www.debian.org/security/2015/dsa-3185
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
- https://access.redhat.com/security/cve/CVE-2015-1606
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
- https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
- http://www.debian.org/security/2015/dsa-3184
- http://www.openwall.com/lists/oss-security/2015/02/13/14
- http://www.openwall.com/lists/oss-security/2015/02/14/6
- http://www.securitytracker.com/id/1031876
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
low severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://access.redhat.com/security/cve/CVE-2014-3591
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
- http://www.cs.tau.ac.il/~tromer/radioexp/
- http://www.debian.org/security/2015/dsa-3184
- http://www.debian.org/security/2015/dsa-3185
low severity
- Vulnerable module: libgcrypt
- Introduced through: libgcrypt@1.5.3-14.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcrypt@1.5.3-14.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt package and not the libgcrypt package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Remediation
There is no fixed version for Centos:7 libgcrypt.
References
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
- https://access.redhat.com/security/cve/CVE-2015-0837
- https://ieeexplore.ieee.org/document/7163050
- http://www.debian.org/security/2015/dsa-3184
- http://www.debian.org/security/2015/dsa-3185
low severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
Remediation
There is no fixed version for Centos:7 libxml2.
References
low severity
new
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim is vulnerable to Use After Free
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- https://access.redhat.com/security/cve/CVE-2021-3974
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
- https://security.gentoo.org/glsa/202208-32
low severity
- Vulnerable module: bsdtar
- Introduced through: bsdtar@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › bsdtar@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream bsdtar package and not the bsdtar package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.
Remediation
There is no fixed version for Centos:7 bsdtar.
References
low severity
- Vulnerable module: giflib
- Introduced through: giflib@4.1.6-9.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › giflib@4.1.6-9.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream giflib package and not the giflib package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Remediation
There is no fixed version for Centos:7 giflib.
References
- https://access.redhat.com/security/cve/CVE-2023-39742
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/
- https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/
- https://sourceforge.net/p/giflib/bugs/166/
low severity
- Vulnerable module: libarchive
- Introduced through: libarchive@3.1.2-14.el7_7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libarchive@3.1.2-14.el7_7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.
Remediation
There is no fixed version for Centos:7 libarchive.
References
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Remediation
There is no fixed version for Centos:7 ncurses.
References
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2845
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c
- https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2022-2849
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://github.com/vim/vim/commit/f6d39c31d2177549a986d170e192d8351bd571e2
- https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://security.gentoo.org/glsa/202305-16
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- https://access.redhat.com/security/cve/CVE-2025-1215
- https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9
- https://github.com/vim/vim/releases/tag/v9.1.1097
- https://vuldb.com/?ctiid.295174
- https://vuldb.com/?id.295174
- https://security.netapp.com/advisory/ntap-20250321-0005/
- https://github.com/vim/vim/issues/16606
- https://vuldb.com/?submit.497546
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
Remediation
There is no fixed version for Centos:7 gnupg2.
References
low severity
- Vulnerable module: openldap
- Introduced through: openldap@2.4.44-21.el7_6
Detailed paths
-
Introduced through: jboss/base-jdk@8 › openldap@2.4.44-21.el7_6
NVD Description
Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
Remediation
There is no fixed version for Centos:7 openldap.
References
low severity
- Vulnerable module: python
- Introduced through: python@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
Remediation
There is no fixed version for Centos:7 python.
References
- https://access.redhat.com/security/cve/CVE-2024-5642
- https://github.com/python/cpython/commit/a2cdbb6e8188ba9ba8b356b28d91bff60e86fe31
- http://www.openwall.com/lists/oss-security/2024/06/28/4
- https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
- https://github.com/python/cpython/issues/121227
- https://github.com/python/cpython/pull/23014
- https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
- https://security.netapp.com/advisory/ntap-20240726-0005/
low severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-88.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › python-libs@2.7.5-88.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
Remediation
There is no fixed version for Centos:7 python-libs.
References
- https://access.redhat.com/security/cve/CVE-2024-5642
- https://github.com/python/cpython/commit/a2cdbb6e8188ba9ba8b356b28d91bff60e86fe31
- http://www.openwall.com/lists/oss-security/2024/06/28/4
- https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
- https://github.com/python/cpython/issues/121227
- https://github.com/python/cpython/pull/23014
- https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
- https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
- https://security.netapp.com/advisory/ntap-20240726-0005/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
Remediation
There is no fixed version for Centos:7 glibc.
References
- http://www.securityfocus.com/bid/68006
- https://seclists.org/bugtraq/2019/Jun/14
- https://seclists.org/bugtraq/2019/Sep/7
- https://bugzilla.redhat.com/show_bug.cgi?id=1109263
- https://sourceware.org/bugzilla/show_bug.cgi?id=17048
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
- https://access.redhat.com/security/cve/CVE-2014-4043
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2019/Sep/7
- https://security.gentoo.org/glsa/201503-04
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
low severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-307.el7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › glibc-common@2.17-307.el7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
Remediation
There is no fixed version for Centos:7 glibc-common.
References
- http://www.securityfocus.com/bid/68006
- https://seclists.org/bugtraq/2019/Jun/14
- https://seclists.org/bugtraq/2019/Sep/7
- https://bugzilla.redhat.com/show_bug.cgi?id=1109263
- https://sourceware.org/bugzilla/show_bug.cgi?id=17048
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
- https://access.redhat.com/security/cve/CVE-2014-4043
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2019/Sep/7
- https://security.gentoo.org/glsa/201503-04
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
low severity
- Vulnerable module: libtiff
- Introduced through: libtiff@4.0.3-32.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libtiff@4.0.3-32.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff package and not the libtiff package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Centos:7 libtiff.
References
- https://access.redhat.com/security/cve/CVE-2024-13978
- http://www.libtiff.org/
- https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4
- https://gitlab.com/libtiff/libtiff/-/merge_requests/667
- https://vuldb.com/?ctiid.318355
- https://vuldb.com/?id.318355
- https://vuldb.com/?submit.624562
- https://lists.debian.org/debian-lts-announce/2025/09/msg00031.html
- https://gitlab.com/libtiff/libtiff/-/issues/649
low severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Remediation
There is no fixed version for Centos:7 libxml2.
References
low severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.el7.4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libxml2-python@2.9.1-6.el7.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Remediation
There is no fixed version for Centos:7 libxml2-python.
References
low severity
- Vulnerable module: ncurses
- Introduced through: ncurses@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
Remediation
There is no fixed version for Centos:7 ncurses.
References
- http://invisible-island.net/ncurses/NEWS.html#t20171125
- https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
- https://access.redhat.com/security/cve/CVE-2017-16879
- https://security.gentoo.org/glsa/201804-13
- http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-base
- Introduced through: ncurses-base@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-base@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-base package and not the ncurses-base package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
Remediation
There is no fixed version for Centos:7 ncurses-base.
References
- http://invisible-island.net/ncurses/NEWS.html#t20171125
- https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
- https://access.redhat.com/security/cve/CVE-2017-16879
- https://security.gentoo.org/glsa/201804-13
- http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: ncurses-libs
- Introduced through: ncurses-libs@5.9-14.20130511.el7_4
Detailed paths
-
Introduced through: jboss/base-jdk@8 › ncurses-libs@5.9-14.20130511.el7_4
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses-libs package and not the ncurses-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
Remediation
There is no fixed version for Centos:7 ncurses-libs.
References
- http://invisible-island.net/ncurses/NEWS.html#t20171125
- https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
- https://access.redhat.com/security/cve/CVE-2017-16879
- https://security.gentoo.org/glsa/201804-13
- http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- http://www.securityfocus.com/bid/96448
- https://access.redhat.com/security/cve/CVE-2017-6350
- https://security.gentoo.org/glsa/201706-26
- https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
- https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
- http://www.securitytracker.com/id/1037949
- https://usn.ubuntu.com/4309-1/
- https://groups.google.com/forum/#%21topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#%21topic/vim_dev/QPZc0CY9j3Y
low severity
- Vulnerable module: vim-minimal
- Introduced through: vim-minimal@2:7.4.629-6.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › vim-minimal@2:7.4.629-6.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal package and not the vim-minimal package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
Remediation
There is no fixed version for Centos:7 vim-minimal.
References
- http://www.securityfocus.com/bid/96217
- https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d
- https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY
- https://access.redhat.com/security/cve/CVE-2017-5953
- http://www.debian.org/security/2017/dsa-3786
- https://security.gentoo.org/glsa/201706-26
- https://usn.ubuntu.com/4016-1/
- https://usn.ubuntu.com/4309-1/
- https://groups.google.com/forum/#%21topic/vim_dev/t-3RSdEnrHY
low severity
- Vulnerable module: curl
- Introduced through: curl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › curl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Remediation
There is no fixed version for Centos:7 curl.
References
low severity
- Vulnerable module: libcurl
- Introduced through: libcurl@7.29.0-57.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libcurl@7.29.0-57.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Remediation
There is no fixed version for Centos:7 libcurl.
References
low severity
- Vulnerable module: systemd
- Introduced through: systemd@219-73.el7_8.9
- Fixed in: 0:219-78.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
Remediation
Upgrade Centos:7 systemd to version 0:219-78.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20200210-0002/
- https://access.redhat.com/security/cve/CVE-2019-20386
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
- https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
- https://access.redhat.com/errata/RHSA-2020:4007
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
- https://usn.ubuntu.com/4269-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
low severity
- Vulnerable module: systemd-libs
- Introduced through: systemd-libs@219-73.el7_8.9
- Fixed in: 0:219-78.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › systemd-libs@219-73.el7_8.9
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-libs package and not the systemd-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
Remediation
Upgrade Centos:7 systemd-libs to version 0:219-78.el7 or higher.
References
- https://security.netapp.com/advisory/ntap-20200210-0002/
- https://access.redhat.com/security/cve/CVE-2019-20386
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
- https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
- https://access.redhat.com/errata/RHSA-2020:4007
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
- https://usn.ubuntu.com/4269-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
low severity
- Vulnerable module: device-mapper
- Introduced through: device-mapper@7:1.02.164-7.el7_8.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › device-mapper@7:1.02.164-7.el7_8.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream device-mapper package and not the device-mapper package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs. NOTE: RedHat disputes CVE-2020-8991 as not being a vulnerability since there’s no apparent route to either privilege escalation or to denial of service through the bug
Remediation
There is no fixed version for Centos:7 device-mapper.
References
low severity
- Vulnerable module: device-mapper-libs
- Introduced through: device-mapper-libs@7:1.02.164-7.el7_8.2
Detailed paths
-
Introduced through: jboss/base-jdk@8 › device-mapper-libs@7:1.02.164-7.el7_8.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream device-mapper-libs package and not the device-mapper-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs. NOTE: RedHat disputes CVE-2020-8991 as not being a vulnerability since there’s no apparent route to either privilege escalation or to denial of service through the bug
Remediation
There is no fixed version for Centos:7 device-mapper-libs.
References
low severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
Detailed paths
-
Introduced through: jboss/base-jdk@8 › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
Remediation
There is no fixed version for Centos:7 gnupg2.
References
low severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
Remediation
There is no fixed version for Centos:7 sqlite.
References
- http://www.securityfocus.com/bid/91546
- https://www.sqlite.org/releaselog/3_13_0.html
- https://www.tenable.com/security/tns-2016-20
- http://www.sqlite.org/cgi/src/info/67985761aa93fb61
- https://access.redhat.com/security/cve/CVE-2016-6153
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
- https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
- http://www.openwall.com/lists/oss-security/2016/07/01/1
- http://www.openwall.com/lists/oss-security/2016/07/01/2
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html
- https://usn.ubuntu.com/4019-1/
- https://usn.ubuntu.com/4019-2/
- https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
low severity
- Vulnerable module: cups-libs
- Introduced through: cups-libs@1:1.6.3-43.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › cups-libs@1:1.6.3-43.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups-libs package and not the cups-libs package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.
Remediation
There is no fixed version for Centos:7 cups-libs.
References
- https://bugzilla.suse.com/show_bug.cgi?id=1184161
- https://access.redhat.com/security/cve/CVE-2021-25317
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWPGZLT3U776Q5YPPSA6LGFWWBDWBVH3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H74BP746O5NNVCBUTLLZYAFBPESFVECV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S37IDQGHTORQ3Z6VRDQIGBYVOI27YG47/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWPGZLT3U776Q5YPPSA6LGFWWBDWBVH3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H74BP746O5NNVCBUTLLZYAFBPESFVECV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S37IDQGHTORQ3Z6VRDQIGBYVOI27YG47/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
Remediation
There is no fixed version for Centos:7 binutils.
References
- http://www.securityfocus.com/bid/104540
- https://access.redhat.com/security/cve/CVE-2018-12699
- https://security.gentoo.org/glsa/201908-01
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- https://usn.ubuntu.com/4336-1/
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.27-43.base.el7_8.1
Detailed paths
-
Introduced through: jboss/base-jdk@8 › binutils@2.27-43.base.el7_8.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
Remediation
There is no fixed version for Centos:7 binutils.
References
low severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libgcc@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
Remediation
There is no fixed version for Centos:7 libgcc.
References
low severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-39.el7
Detailed paths
-
Introduced through: jboss/base-jdk@8 › libstdc++@4.8.5-39.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
Remediation
There is no fixed version for Centos:7 libstdc++.