Vulnerabilities |
54 via 54 paths |
|---|---|
Dependencies |
108 |
Source |
Docker |
Target OS |
oracle:7 |
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.5.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.5.el7_9.6 or higher.
This issue was patched in ELSA-2025-2673.
References
- https://linux.oracle.com/cve/CVE-2024-56171.html
- https://linux.oracle.com/errata/ELSA-2025-2679.html
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
- https://security.netapp.com/advisory/ntap-20250328-0010/
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/11
- http://seclists.org/fulldisclosure/2025/Apr/12
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/8
- http://seclists.org/fulldisclosure/2025/Apr/9
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.5.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.5.el7_9.6 or higher.
This issue was patched in ELSA-2025-2673.
References
- https://linux.oracle.com/cve/CVE-2024-56171.html
- https://linux.oracle.com/errata/ELSA-2025-2679.html
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
- https://security.netapp.com/advisory/ntap-20250328-0010/
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/11
- http://seclists.org/fulldisclosure/2025/Apr/12
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/8
- http://seclists.org/fulldisclosure/2025/Apr/9
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2177.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://linux.oracle.com/errata/ELSA-2016-3627.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2017-1659.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.openwall.com/lists/oss-security/2016/06/08/9
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/archive/1/540957/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded
- http://www.securityfocus.com/bid/91319
- http://www.securitytracker.com/id/1036088
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3181-1
- https://access.redhat.com/errata/RHSA-2017:0193
- https://access.redhat.com/errata/RHSA-2017:0194
- https://access.redhat.com/errata/RHSA-2017:1658
- https://bto.bluecoat.com/security-advisory/sa132
- https://bugzilla.redhat.com/show_bug.cgi?id=1341705
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=a004e72b95835136d3f1ea90517f706c24c03da7
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10165
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://security.gentoo.org/glsa/201612-16
- https://support.f5.com/csp/article/K23873366
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager
- https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/
- https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2108.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-1137.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871
- https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.citrix.com/article/CTX212736
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://www.debian.org/security/2016/dsa-3566
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/89752
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035721
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://www.ubuntu.com/usn/USN-2959-1
- https://access.redhat.com/errata/RHSA-2016:1137
- https://access.redhat.com/errata/RHSA-2017:0193
- https://access.redhat.com/errata/RHSA-2017:0194
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
- https://security.gentoo.org/glsa/201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://support.apple.com/HT206903
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-0799.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://linux.oracle.com/errata/ELSA-2016-3576.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://marc.info/?l=bugtraq&m=145983526810210&w=2
- http://marc.info/?l=bugtraq&m=146108058503441&w=2
- http://openssl.org/news/secadv/20160301.txt
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
- http://www.debian.org/security/2016/dsa-3500
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/83755
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035133
- http://www.ubuntu.com/usn/USN-2914-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=578b956fe741bf8e84055547b1e83c28dd902c73
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
- https://security.gentoo.org/glsa/201603-15
- https://www.openssl.org/news/secadv/20160301.txt
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2842.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
- http://marc.info/?l=bugtraq&m=145983526810210&w=2
- http://marc.info/?l=bugtraq&m=146108058503441&w=2
- http://openssl.org/news/secadv/20160301.txt
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/84169
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=578b956fe741bf8e84055547b1e83c28dd902c73
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kc.mcafee.com/corporate/index?page=content&id=SB10152
- https://security.netapp.com/advisory/ntap-20160321-0001/
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2182.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://linux.oracle.com/errata/ELSA-2016-3627.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/92557
- http://www.securitytracker.com/id/1036688
- http://www.securitytracker.com/id/1037968
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- https://access.redhat.com/errata/RHSA-2018:2185
- https://access.redhat.com/errata/RHSA-2018:2186
- https://access.redhat.com/errata/RHSA-2018:2187
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=07bed46f332fce8c1d157689a2cdf915a982ae34
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://source.android.com/security/bulletin/2017-03-01
- https://source.android.com/security/bulletin/2017-03-01.html
- https://support.f5.com/csp/article/K01276005
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: sqlite
- Introduced through: sqlite@3.7.17-8.el7_7.1
- Fixed in: 0:3.7.17-8.0.1.el7_9.1
Detailed paths
-
Introduced through: oraclelinux@7-slim › sqlite@3.7.17-8.el7_7.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite package and not the sqlite package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.
Remediation
Upgrade Oracle:7 sqlite to version 0:3.7.17-8.0.1.el7_9.1 or higher.
This issue was patched in ELSA-2025-12349.
References
- https://linux.oracle.com/cve/CVE-2025-6965.html
- https://linux.oracle.com/errata/ELSA-2025-11803.html
- https://linux.oracle.com/errata/ELSA-2025-20936.html
- https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8
- http://seclists.org/fulldisclosure/2025/Sep/49
- http://seclists.org/fulldisclosure/2025/Sep/53
- http://seclists.org/fulldisclosure/2025/Sep/56
- http://seclists.org/fulldisclosure/2025/Sep/57
- http://seclists.org/fulldisclosure/2025/Sep/58
- http://www.openwall.com/lists/oss-security/2025/09/06/1
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-49794.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/security/cve/CVE-2025-49794
- https://bugzilla.redhat.com/show_bug.cgi?id=2372373
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-49796.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/security/cve/CVE-2025-49796
- https://bugzilla.redhat.com/show_bug.cgi?id=2372385
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/933
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-49794.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/security/cve/CVE-2025-49794
- https://bugzilla.redhat.com/show_bug.cgi?id=2372373
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-49796.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/security/cve/CVE-2025-49796
- https://bugzilla.redhat.com/show_bug.cgi?id=2372385
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/933
high severity
- Vulnerable module: zlib
- Introduced through: zlib@1.2.7-21.el7_9
- Fixed in: 0:1.2.7-21.0.1.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › zlib@1.2.7-21.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
Remediation
Upgrade Oracle:7 zlib to version 0:1.2.7-21.0.1.el7_9 or higher.
This issue was patched in ELSA-2025-8314.
References
- https://linux.oracle.com/cve/CVE-2016-9840.html
- https://linux.oracle.com/errata/ELSA-2025-8395.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html
- http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html
- http://www.openwall.com/lists/oss-security/2016/12/05/21
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/95131
- http://www.securitytracker.com/id/1039427
- https://access.redhat.com/errata/RHSA-2017:1220
- https://access.redhat.com/errata/RHSA-2017:1221
- https://access.redhat.com/errata/RHSA-2017:1222
- https://access.redhat.com/errata/RHSA-2017:2999
- https://access.redhat.com/errata/RHSA-2017:3046
- https://access.redhat.com/errata/RHSA-2017:3047
- https://access.redhat.com/errata/RHSA-2017:3453
- https://bugzilla.redhat.com/show_bug.cgi?id=1402345
- https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
- https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html
- https://security.gentoo.org/glsa/201701-56
- https://security.gentoo.org/glsa/202007-54
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://usn.ubuntu.com/4246-1/
- https://usn.ubuntu.com/4292-1/
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://www.oracle.com/security-alerts/cpujul2020.html
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.9.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.9.el7_9.6 or higher.
This issue was patched in ELSA-2025-13464.
References
- https://linux.oracle.com/cve/CVE-2025-7425.html
- https://linux.oracle.com/errata/ELSA-2025-12450.html
- https://access.redhat.com/security/cve/CVE-2025-7425
- https://bugzilla.redhat.com/show_bug.cgi?id=2379274
- https://access.redhat.com/errata/RHSA-2025:12447
- https://access.redhat.com/errata/RHSA-2025:12450
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13313
- https://access.redhat.com/errata/RHSA-2025:13314
- https://access.redhat.com/errata/RHSA-2025:13308
- https://access.redhat.com/errata/RHSA-2025:13309
- https://access.redhat.com/errata/RHSA-2025:13310
- https://access.redhat.com/errata/RHSA-2025:13311
- https://access.redhat.com/errata/RHSA-2025:13312
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13464
- https://access.redhat.com/errata/RHSA-2025:13622
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:14819
- https://access.redhat.com/errata/RHSA-2025:14818
- https://access.redhat.com/errata/RHSA-2025:14853
- https://access.redhat.com/errata/RHSA-2025:14858
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/errata/RHSA-2025:18219
- https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html
- http://seclists.org/fulldisclosure/2025/Aug/0
- http://seclists.org/fulldisclosure/2025/Jul/30
- http://seclists.org/fulldisclosure/2025/Jul/32
- http://seclists.org/fulldisclosure/2025/Jul/35
- http://seclists.org/fulldisclosure/2025/Jul/37
- http://www.openwall.com/lists/oss-security/2025/07/11/2
- https://access.redhat.com/errata/RHSA-2025:21885
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.9.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.9.el7_9.6 or higher.
This issue was patched in ELSA-2025-13464.
References
- https://linux.oracle.com/cve/CVE-2025-7425.html
- https://linux.oracle.com/errata/ELSA-2025-12450.html
- https://access.redhat.com/security/cve/CVE-2025-7425
- https://bugzilla.redhat.com/show_bug.cgi?id=2379274
- https://access.redhat.com/errata/RHSA-2025:12447
- https://access.redhat.com/errata/RHSA-2025:12450
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13313
- https://access.redhat.com/errata/RHSA-2025:13314
- https://access.redhat.com/errata/RHSA-2025:13308
- https://access.redhat.com/errata/RHSA-2025:13309
- https://access.redhat.com/errata/RHSA-2025:13310
- https://access.redhat.com/errata/RHSA-2025:13311
- https://access.redhat.com/errata/RHSA-2025:13312
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13464
- https://access.redhat.com/errata/RHSA-2025:13622
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:14819
- https://access.redhat.com/errata/RHSA-2025:14818
- https://access.redhat.com/errata/RHSA-2025:14853
- https://access.redhat.com/errata/RHSA-2025:14858
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/errata/RHSA-2025:18219
- https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html
- http://seclists.org/fulldisclosure/2025/Aug/0
- http://seclists.org/fulldisclosure/2025/Jul/30
- http://seclists.org/fulldisclosure/2025/Jul/32
- http://seclists.org/fulldisclosure/2025/Jul/35
- http://seclists.org/fulldisclosure/2025/Jul/37
- http://www.openwall.com/lists/oss-security/2025/07/11/2
- https://access.redhat.com/errata/RHSA-2025:21885
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.5.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.5.el7_9.6 or higher.
This issue was patched in ELSA-2025-2673.
References
- https://linux.oracle.com/cve/CVE-2025-24928.html
- https://linux.oracle.com/errata/ELSA-2025-2679.html
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
- https://issues.oss-fuzz.com/issues/392687022
- https://security.netapp.com/advisory/ntap-20250321-0006/
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.5.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.5.el7_9.6 or higher.
This issue was patched in ELSA-2025-2673.
References
- https://linux.oracle.com/cve/CVE-2025-24928.html
- https://linux.oracle.com/errata/ELSA-2025-2679.html
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
- https://issues.oss-fuzz.com/issues/392687022
- https://security.netapp.com/advisory/ntap-20250321-0006/
- https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-6021.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13289
- https://access.redhat.com/errata/RHSA-2025:13325
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13336
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/security/cve/CVE-2025-6021
- https://bugzilla.redhat.com/show_bug.cgi?id=2372406
- https://access.redhat.com/errata/RHSA-2025:19020
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:11673
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
high severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
- https://linux.oracle.com/cve/CVE-2025-6021.html
- https://linux.oracle.com/errata/ELSA-2025-10630.html
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13289
- https://access.redhat.com/errata/RHSA-2025:13325
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13336
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/security/cve/CVE-2025-6021
- https://bugzilla.redhat.com/show_bug.cgi?id=2372406
- https://access.redhat.com/errata/RHSA-2025:19020
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:11673
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
high severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.7.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.7.el7_9.6 or higher.
This issue was patched in ELSA-2025-12240.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-6302.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://www.openssl.org/news/vulnerabilities.html#y2017
- https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/92628
- http://www.securitytracker.com/id/1036885
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://access.redhat.com/errata/RHSA-2018:2185
- https://access.redhat.com/errata/RHSA-2018:2186
- https://access.redhat.com/errata/RHSA-2018:2187
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2105.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://linux.oracle.com/errata/ELSA-2016-3576.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-1648.html
- http://rhn.redhat.com/errata/RHSA-2016-1649.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://www.debian.org/security/2016/dsa-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/89757
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035721
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://www.ubuntu.com/usn/USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://security.gentoo.org/glsa/201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://support.apple.com/HT206903
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 10:1.0.2k-22.el7_9_fips
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Remediation
Upgrade Oracle:7 openssl-libs to version 10:1.0.2k-22.el7_9_fips or higher.
This issue was patched in ELSA-2021-9528.
References
- https://linux.oracle.com/cve/CVE-2021-23840.html
- https://linux.oracle.com/errata/ELSA-2021-3798.html
- https://linux.oracle.com/errata/ELSA-2021-4424.html
- https://linux.oracle.com/errata/ELSA-2021-9478.html
- https://linux.oracle.com/errata/ELSA-2021-9528.html
- https://linux.oracle.com/errata/ELSA-2021-9561.html
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/202103-03
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-4855
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-10
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-6304.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://rhn.redhat.com/errata/RHSA-2016-2802.html
- http://rhn.redhat.com/errata/RHSA-2017-1415.html
- http://rhn.redhat.com/errata/RHSA-2017-1659.html
- http://seclists.org/fulldisclosure/2016/Dec/47
- http://seclists.org/fulldisclosure/2016/Oct/62
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/93150
- http://www.securitytracker.com/id/1036878
- http://www.securitytracker.com/id/1037640
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- https://access.redhat.com/errata/RHSA-2017:1413
- https://access.redhat.com/errata/RHSA-2017:1414
- https://access.redhat.com/errata/RHSA-2017:1658
- https://access.redhat.com/errata/RHSA-2017:1801
- https://access.redhat.com/errata/RHSA-2017:1802
- https://access.redhat.com/errata/RHSA-2017:2493
- https://access.redhat.com/errata/RHSA-2017:2494
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=2c0d295e26306e15a92eb23a84a1802005c1c137
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://security.gentoo.org/glsa/201612-16
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.openssl.org/news/secadv/20160922.txt
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2181.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/92982
- http://www.securitytracker.com/id/1036690
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://support.f5.com/csp/article/K59298921
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2106.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://linux.oracle.com/errata/ELSA-2016-3576.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-1648.html
- http://rhn.redhat.com/errata/RHSA-2016-1649.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://www.debian.org/security/2016/dsa-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/89744
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035721
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://www.ubuntu.com/usn/USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3f3582139fbb259a1c3cbb0a25236500a409bf26
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://security.gentoo.org/glsa/201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://support.apple.com/HT206903
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2180.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://www.openssl.org/news/vulnerabilities.html#y2017
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/92117
- http://www.securitytracker.com/id/1036486
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bto.bluecoat.com/security-advisory/sa132
- https://bugzilla.redhat.com/show_bug.cgi?id=1359615
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://security.gentoo.org/glsa/201612-16
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2109.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://linux.oracle.com/errata/ELSA-2016-3576.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://www.debian.org/security/2016/dsa-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/87940
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035721
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://www.ubuntu.com/usn/USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://security.gentoo.org/glsa/201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/2017-07-01
- https://support.apple.com/HT206903
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2179.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://www.openssl.org/news/vulnerabilities.html#y2017
- https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/92987
- http://www.securitytracker.com/id/1036689
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: gnupg2
- Introduced through: gnupg2@2.0.22-5.el7_5
- Fixed in: 0:2.0.22-5.0.1.el7_5
Detailed paths
-
Introduced through: oraclelinux@7-slim › gnupg2@2.0.22-5.el7_5
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
Remediation
Upgrade Oracle:7 gnupg2 to version 0:2.0.22-5.0.1.el7_5 or higher.
This issue was patched in ELSA-2026-1677.
References
- https://linux.oracle.com/cve/CVE-2025-68973.html
- https://linux.oracle.com/errata/ELSA-2026-0697.html
- https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306
- https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9
- https://github.com/gpg/gnupg/compare/gnupg-2.2.50...gnupg-2.2.51
- https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i
- https://news.ycombinator.com/item?id=46403200
- https://www.openwall.com/lists/oss-security/2025/12/28/5
- http://www.openwall.com/lists/oss-security/2025/12/29/11
- https://lists.debian.org/debian-lts-announce/2026/01/msg00008.html
- https://gpg.fail/memcpy
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.5
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.5 or higher.
This issue was patched in ELSA-2016-3556.
References
- https://linux.oracle.com/cve/CVE-2016-2107.html
- https://linux.oracle.com/errata/ELSA-2016-0722.html
- https://linux.oracle.com/errata/ELSA-2016-0996.html
- https://linux.oracle.com/errata/ELSA-2016-3556.html
- https://linux.oracle.com/errata/ELSA-2016-3558.html
- https://linux.oracle.com/errata/ELSA-2016-3571.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.citrix.com/article/CTX212736
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
- http://www.debian.org/security/2016/dsa-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/89760
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035721
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://www.ubuntu.com/usn/USN-2959-1
- https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://security.gentoo.org/glsa/201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://support.apple.com/HT206903
- https://www.exploit-db.com/exploits/39768/
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://github.com/FiloSottile/CVE-2016-2107
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 10:1.0.2k-22.el7_9_fips
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Remediation
Upgrade Oracle:7 openssl-libs to version 10:1.0.2k-22.el7_9_fips or higher.
This issue was patched in ELSA-2021-9528.
References
- https://linux.oracle.com/cve/CVE-2021-23841.html
- https://linux.oracle.com/errata/ELSA-2021-3798.html
- https://linux.oracle.com/errata/ELSA-2021-4424.html
- https://linux.oracle.com/errata/ELSA-2021-9478.html
- https://linux.oracle.com/errata/ELSA-2021-9528.html
- https://linux.oracle.com/errata/ELSA-2021-9561.html
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- http://seclists.org/fulldisclosure/2021/May/67
- http://seclists.org/fulldisclosure/2021/May/68
- http://seclists.org/fulldisclosure/2021/May/70
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://security.gentoo.org/glsa/202103-03
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT212528
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212534
- https://www.debian.org/security/2021/dsa-4855
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-6306.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://linux.oracle.com/errata/ELSA-2016-3627.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/93153
- http://www.securitytracker.com/id/1036885
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- https://access.redhat.com/errata/RHSA-2018:2185
- https://access.redhat.com/errata/RHSA-2018:2186
- https://access.redhat.com/errata/RHSA-2018:2187
- https://bto.bluecoat.com/security-advisory/sa132
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://security.gentoo.org/glsa/201612-16
- https://support.f5.com/csp/article/K90492697
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.openssl.org/news/secadv/20160922.txt
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.7 or higher.
This issue was patched in ELSA-2016-3621.
References
- https://linux.oracle.com/cve/CVE-2016-2178.html
- https://linux.oracle.com/errata/ELSA-2016-1940.html
- https://linux.oracle.com/errata/ELSA-2016-3621.html
- https://linux.oracle.com/errata/ELSA-2016-3627.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2
- http://eprint.iacr.org/2016/594.pdf
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2016-1940.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2017-1659.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.openwall.com/lists/oss-security/2016/06/08/10
- http://www.openwall.com/lists/oss-security/2016/06/08/11
- http://www.openwall.com/lists/oss-security/2016/06/08/12
- http://www.openwall.com/lists/oss-security/2016/06/08/2
- http://www.openwall.com/lists/oss-security/2016/06/08/4
- http://www.openwall.com/lists/oss-security/2016/06/08/5
- http://www.openwall.com/lists/oss-security/2016/06/08/6
- http://www.openwall.com/lists/oss-security/2016/06/08/7
- http://www.openwall.com/lists/oss-security/2016/06/08/8
- http://www.openwall.com/lists/oss-security/2016/06/09/2
- http://www.openwall.com/lists/oss-security/2016/06/09/8
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/91081
- http://www.securitytracker.com/id/1036054
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- https://access.redhat.com/errata/RHSA-2017:0193
- https://access.redhat.com/errata/RHSA-2017:0194
- https://access.redhat.com/errata/RHSA-2017:1658
- https://bto.bluecoat.com/security-advisory/sa132
- https://bugzilla.redhat.com/show_bug.cgi?id=1343400
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=399944622df7bd81af62e67ea967c470534090e2
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
- https://security.gentoo.org/glsa/201612-16
- https://support.f5.com/csp/article/K53084033
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-51.ksplice1.el7_2.4
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-51.ksplice1.el7_2.4 or higher.
This issue was patched in ELSA-2016-3523.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.2k-12.0.1.ksplice1.el7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.2k-12.0.1.ksplice1.el7 or higher.
This issue was patched in ELSA-2018-4077.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.2k-12.0.3.ksplice1.el7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.2k-12.0.3.ksplice1.el7 or higher.
This issue was patched in ELSA-2018-4253.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.2k-16.0.1.ksplice1.el7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.2k-16.0.1.ksplice1.el7 or higher.
This issue was patched in ELSA-2018-4267.
References
high severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.2k-16.0.1.ksplice1.el7_6.1
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.2k-16.0.1.ksplice1.el7_6.1 or higher.
This issue was patched in ELSA-2019-4581.
References
medium severity
- Vulnerable module: glib2
- Introduced through: glib2@2.56.1-9.el7_9
- Fixed in: 0:2.56.1-9.0.3.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › glib2@2.56.1-9.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2 package and not the glib2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Remediation
Upgrade Oracle:7 glib2 to version 0:2.56.1-9.0.3.el7_9 or higher.
This issue was patched in ELSA-2026-1608.
References
- https://linux.oracle.com/cve/CVE-2025-13601.html
- https://linux.oracle.com/errata/ELSA-2026-0936.html
- https://access.redhat.com/errata/RHSA-2026:0936
- https://access.redhat.com/errata/RHSA-2026:0975
- https://access.redhat.com/errata/RHSA-2026:0991
- https://access.redhat.com/errata/RHSA-2026:1323
- https://access.redhat.com/errata/RHSA-2026:1324
- https://access.redhat.com/errata/RHSA-2026:1326
- https://access.redhat.com/errata/RHSA-2026:1327
- https://access.redhat.com/errata/RHSA-2026:1465
- https://access.redhat.com/errata/RHSA-2026:1608
- https://access.redhat.com/errata/RHSA-2026:1624
- https://access.redhat.com/errata/RHSA-2026:1625
- https://access.redhat.com/errata/RHSA-2026:1626
- https://access.redhat.com/errata/RHSA-2026:1627
- https://access.redhat.com/errata/RHSA-2026:1652
- https://access.redhat.com/errata/RHSA-2026:1736
- https://access.redhat.com/security/cve/CVE-2025-13601
- https://bugzilla.redhat.com/show_bug.cgi?id=2416741
- https://gitlab.gnome.org/GNOME/glib/-/issues/3827
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
- https://access.redhat.com/errata/RHSA-2026:2064
- https://access.redhat.com/errata/RHSA-2026:2072
- https://access.redhat.com/errata/RHSA-2026:2485
- https://access.redhat.com/errata/RHSA-2026:2563
- https://access.redhat.com/errata/RHSA-2026:2633
- https://access.redhat.com/errata/RHSA-2026:2659
- https://access.redhat.com/errata/RHSA-2026:2671
- https://access.redhat.com/errata/RHSA-2026:2974
- https://access.redhat.com/errata/RHSA-2026:3415
- https://access.redhat.com/errata/RHSA-2026:4419
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.11.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
Remediation
Upgrade Oracle:7 libxml2 to version 0:2.9.1-6.0.11.el7_9.6 or higher.
This issue was patched in ELSA-2025-13789.
References
medium severity
- Vulnerable module: libxml2-python
- Introduced through: libxml2-python@2.9.1-6.0.3.el7_9.6
- Fixed in: 0:2.9.1-6.0.11.el7_9.6
Detailed paths
-
Introduced through: oraclelinux@7-slim › libxml2-python@2.9.1-6.0.3.el7_9.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2-python package and not the libxml2-python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
Remediation
Upgrade Oracle:7 libxml2-python to version 0:2.9.1-6.0.11.el7_9.6 or higher.
This issue was patched in ELSA-2025-13789.
References
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 10:1.0.2k-23.0.1.el7_9_fips
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
Remediation
Upgrade Oracle:7 openssl-libs to version 10:1.0.2k-23.0.1.el7_9_fips or higher.
This issue was patched in ELSA-2022-9023.
References
- https://linux.oracle.com/cve/CVE-2021-3712.html
- https://linux.oracle.com/errata/ELSA-2021-5226.html
- https://linux.oracle.com/errata/ELSA-2021-9632.html
- https://linux.oracle.com/errata/ELSA-2022-0064.html
- https://linux.oracle.com/errata/ELSA-2022-9017.html
- https://linux.oracle.com/errata/ELSA-2022-9023.html
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
- https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/08/26/2
- https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
- https://security.gentoo.org/glsa/202209-02
- https://security.gentoo.org/glsa/202210-02
- https://security.netapp.com/advisory/ntap-20210827-0010/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://www.debian.org/security/2021/dsa-4963
- https://www.openssl.org/news/secadv/20210824.txt
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-16
- https://www.tenable.com/security/tns-2022-02
medium severity
- Vulnerable module: libgcc
- Introduced through: libgcc@4.8.5-44.0.3.el7
- Fixed in: 0:4.8.5-45.0.1.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › libgcc@4.8.5-44.0.3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcc package and not the libgcc package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Remediation
Upgrade Oracle:7 libgcc to version 0:4.8.5-45.0.1.el7_9 or higher.
This issue was patched in ELSA-2025-1601.
References
- https://linux.oracle.com/cve/CVE-2020-11023.html
- https://linux.oracle.com/errata/ELSA-2020-4847.html
- https://linux.oracle.com/errata/ELSA-2021-0860.html
- https://linux.oracle.com/errata/ELSA-2021-1846.html
- https://linux.oracle.com/errata/ELSA-2021-9400.html
- https://linux.oracle.com/errata/ELSA-2021-9552.html
- https://linux.oracle.com/errata/ELSA-2022-9177.html
- https://linux.oracle.com/errata/ELSA-2025-1306.html
- https://linux.oracle.com/errata/ELSA-2025-1309.html
- https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E
- https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E
- https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
- https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
- https://github.com/github/advisory-database/blob/99afa6fdeaf5d1d23e1021ff915a5e5dbc82c1f1/advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json#L20-L37
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
- http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
- https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
- https://jquery.com/upgrade-guide/3.5/
- https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E
- https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E
- https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E
- https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
- https://security.gentoo.org/glsa/202007-03
- https://security.netapp.com/advisory/ntap-20200511-0006/
- https://www.debian.org/security/2020/dsa-4693
- https://www.drupal.org/sa-core-2020-002
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2021-10
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11023
- https://www.exploit-db.com/exploits/49767
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
medium severity
- Vulnerable module: libstdc++
- Introduced through: libstdc++@4.8.5-44.0.3.el7
- Fixed in: 0:4.8.5-45.0.1.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › libstdc++@4.8.5-44.0.3.el7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libstdc++ package and not the libstdc++ package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Remediation
Upgrade Oracle:7 libstdc++ to version 0:4.8.5-45.0.1.el7_9 or higher.
This issue was patched in ELSA-2025-1601.
References
- https://linux.oracle.com/cve/CVE-2020-11023.html
- https://linux.oracle.com/errata/ELSA-2020-4847.html
- https://linux.oracle.com/errata/ELSA-2021-0860.html
- https://linux.oracle.com/errata/ELSA-2021-1846.html
- https://linux.oracle.com/errata/ELSA-2021-9400.html
- https://linux.oracle.com/errata/ELSA-2021-9552.html
- https://linux.oracle.com/errata/ELSA-2022-9177.html
- https://linux.oracle.com/errata/ELSA-2025-1306.html
- https://linux.oracle.com/errata/ELSA-2025-1309.html
- https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E
- https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E
- https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
- https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
- https://github.com/github/advisory-database/blob/99afa6fdeaf5d1d23e1021ff915a5e5dbc82c1f1/advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json#L20-L37
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
- http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
- https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
- https://jquery.com/upgrade-guide/3.5/
- https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E
- https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E
- https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E
- https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E
- https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E
- https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E
- https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
- https://security.gentoo.org/glsa/202007-03
- https://security.netapp.com/advisory/ntap-20200511-0006/
- https://www.debian.org/security/2020/dsa-4693
- https://www.drupal.org/sa-core-2020-002
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2021-10
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11023
- https://www.exploit-db.com/exploits/49767
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
medium severity
- Vulnerable module: python
- Introduced through: python@2.7.5-94.0.1.el7_9
- Fixed in: 0:2.7.5-94.0.3.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › python@2.7.5-94.0.1.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
Remediation
Upgrade Oracle:7 python to version 0:2.7.5-94.0.3.el7_9 or higher.
This issue was patched in ELSA-2026-1537.
References
- https://linux.oracle.com/cve/CVE-2025-12084.html
- https://linux.oracle.com/errata/ELSA-2026-0123.html
- https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0
- https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4
- https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964
- https://github.com/python/cpython/issues/142145
- https://github.com/python/cpython/pull/142146
- https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437
- https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907
- https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d
- https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8
- https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af
- https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273
- https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53
- https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8
- https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0
medium severity
- Vulnerable module: python-libs
- Introduced through: python-libs@2.7.5-94.0.1.el7_9
- Fixed in: 0:2.7.5-94.0.3.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › python-libs@2.7.5-94.0.1.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-libs package and not the python-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
Remediation
Upgrade Oracle:7 python-libs to version 0:2.7.5-94.0.3.el7_9 or higher.
This issue was patched in ELSA-2026-1537.
References
- https://linux.oracle.com/cve/CVE-2025-12084.html
- https://linux.oracle.com/errata/ELSA-2026-0123.html
- https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0
- https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4
- https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964
- https://github.com/python/cpython/issues/142145
- https://github.com/python/cpython/pull/142146
- https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437
- https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907
- https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d
- https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8
- https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af
- https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273
- https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53
- https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8
- https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0
medium severity
- Vulnerable module: glibc
- Introduced through: glibc@2.17-326.0.9.el7_9.3
- Fixed in: 2:2.17-326.0.11.ksplice1.el7_9.3
Detailed paths
-
Introduced through: oraclelinux@7-slim › glibc@2.17-326.0.9.el7_9.3
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Remediation
Upgrade Oracle:7 glibc to version 2:2.17-326.0.11.ksplice1.el7_9.3 or higher.
This issue was patched in ELSA-2025-20596.
References
- https://linux.oracle.com/cve/CVE-2025-4802.html
- https://linux.oracle.com/errata/ELSA-2025-20375.html
- https://linux.oracle.com/errata/ELSA-2025-20596.html
- https://linux.oracle.com/errata/ELSA-2025-8686.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=32976
- https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
- http://www.openwall.com/lists/oss-security/2025/05/16/7
- http://www.openwall.com/lists/oss-security/2025/05/17/2
- https://lists.debian.org/debian-lts-announce/2025/05/msg00033.html
medium severity
- Vulnerable module: glibc-common
- Introduced through: glibc-common@2.17-326.0.9.el7_9.3
- Fixed in: 2:2.17-326.0.11.ksplice1.el7_9.3
Detailed paths
-
Introduced through: oraclelinux@7-slim › glibc-common@2.17-326.0.9.el7_9.3
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-common package and not the glibc-common package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Remediation
Upgrade Oracle:7 glibc-common to version 2:2.17-326.0.11.ksplice1.el7_9.3 or higher.
This issue was patched in ELSA-2025-20596.
References
- https://linux.oracle.com/cve/CVE-2025-4802.html
- https://linux.oracle.com/errata/ELSA-2025-20375.html
- https://linux.oracle.com/errata/ELSA-2025-20596.html
- https://linux.oracle.com/errata/ELSA-2025-8686.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=32976
- https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
- http://www.openwall.com/lists/oss-security/2025/05/16/7
- http://www.openwall.com/lists/oss-security/2025/05/17/2
- https://lists.debian.org/debian-lts-announce/2025/05/msg00033.html
medium severity
- Vulnerable module: krb5-libs
- Introduced through: krb5-libs@1.15.1-55.0.7.el7_9
- Fixed in: 0:1.15.1-55.0.9.el7_9
Detailed paths
-
Introduced through: oraclelinux@7-slim › krb5-libs@1.15.1-55.0.7.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
Remediation
Upgrade Oracle:7 krb5-libs to version 0:1.15.1-55.0.9.el7_9 or higher.
This issue was patched in ELSA-2025-1352.
References
- https://linux.oracle.com/cve/CVE-2025-24528.html
- https://linux.oracle.com/errata/ELSA-2025-1352.html
- https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
- https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final
- https://lists.debian.org/debian-lts-announce/2025/02/msg00029.html
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 10:1.0.2k-26.0.1.el7_9_fips
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs package and not the openssl-libs package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.
Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.
Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Remediation
Upgrade Oracle:7 openssl-libs to version 10:1.0.2k-26.0.1.el7_9_fips or higher.
This issue was patched in ELSA-2026-50114.
References
- https://linux.oracle.com/cve/CVE-2025-9230.html
- https://linux.oracle.com/errata/ELSA-2025-21255.html
- https://linux.oracle.com/errata/ELSA-2025-28011.html
- https://linux.oracle.com/errata/ELSA-2025-28020.html
- https://linux.oracle.com/errata/ELSA-2025-28041.html
- https://linux.oracle.com/errata/ELSA-2026-50008.html
- https://linux.oracle.com/errata/ELSA-2026-50077.html
- https://linux.oracle.com/errata/ELSA-2026-50114.html
- https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
- https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
- https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
- https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
- https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
- https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
- https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
- https://openssl-library.org/news/secadv/20250930.txt
- https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html
- http://www.openwall.com/lists/oss-security/2025/09/30/5
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.1e-60.ksplice1.el7_3.1
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.1e-60.ksplice1.el7_3.1 or higher.
This issue was patched in ELSA-2017-3518.
References
medium severity
- Vulnerable module: openssl-libs
- Introduced through: openssl-libs@1:1.0.2k-26.el7_9
- Fixed in: 2:1.0.2k-19.0.1.ksplice1.el7
Detailed paths
-
Introduced through: oraclelinux@7-slim › openssl-libs@1:1.0.2k-26.el7_9
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Oracle:7 openssl-libs to version 2:1.0.2k-19.0.1.ksplice1.el7 or higher.
This issue was patched in ELSA-2019-4754.