CVE-2025-49812
OL CVE Issue Summary:
In some mod_ssl configurations on Apache HTTP Server, an HTTP desynchronization attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
OL CVE Issue Summary:
In some mod_ssl configurations on Apache HTTP Server, an HTTP desynchronization attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
OL CVE Issue Summary:
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
OL CVE Issue Summary:
Invalid input to the function `xmlrpc_decode()` can lead to an invalid memory access (heap out of bounds read).
OL CVE Issue Summary:
A flaw was discovered in OpenLDAP before 2.4.57 leading to integer underflow in slapd in the `serialNumberAndIssuerCheck` and`serialNumberAndIssuerSerialCheck` functions in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to assertion failures in slapd in the `authzPrettyNormal` function in `saslauthz.c`,resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_free_ctrls` function in `controls.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to invalid pointer access in slapd in the `authzPrettyNormal` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free in slapd in the `dnPretty` function in `dn.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_parse_user` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an integer underflow in slapd in the `certificateListExactNormalize` function in`schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `issuerAndThisUpdateCheck` function in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a segmentation fault in slapd in the `slap_bv2undef_ad` function in `ad.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the X.509 DN parsing in `decode.c` `ber_next_element`,resulting in denial of service.
OL CVE Issue Summary:
A flaw was discovered in OpenLDAP before 2.4.57 leading to integer underflow in slapd in the `serialNumberAndIssuerCheck` and`serialNumberAndIssuerSerialCheck` functions in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to assertion failures in slapd in the `authzPrettyNormal` function in `saslauthz.c`,resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_free_ctrls` function in `controls.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to invalid pointer access in slapd in the `authzPrettyNormal` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free in slapd in the `dnPretty` function in `dn.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_parse_user` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an integer underflow in slapd in the `certificateListExactNormalize` function in`schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `issuerAndThisUpdateCheck` function in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a segmentation fault in slapd in the `slap_bv2undef_ad` function in `ad.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the X.509 DN parsing in `decode.c` `ber_next_element`,resulting in denial of service.
OL CVE Issue Summary:
A flaw was discovered in OpenLDAP before 2.4.57 leading to integer underflow in slapd in the `serialNumberAndIssuerCheck` and`serialNumberAndIssuerSerialCheck` functions in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to assertion failures in slapd in the `authzPrettyNormal` function in `saslauthz.c`,resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_free_ctrls` function in `controls.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to invalid pointer access in slapd in the `authzPrettyNormal` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free in slapd in the `dnPretty` function in `dn.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `slap_parse_user` function in `saslauthz.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an integer underflow in slapd in the `certificateListExactNormalize` function in`schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a crash in slapd in the `issuerAndThisUpdateCheck` function in `schema_init.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to a segmentation fault in slapd in the `slap_bv2undef_ad` function in `ad.c`, resulting in denial of service.
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the X.509 DN parsing in `decode.c` `ber_next_element`, resulting in denial of service.
OL CVE Issue Summary :
A Local Privilege Escalation (LPE) vulnerability was found in Sudo.
In certain configurations, unauthorized users can gain elevated system privileges via the `sudo` host option (-h or --host).
When using the default sudo security policy plugin (sudoers), the host option is intended to be used in conjunction with the list option (-l or --list) to determine what permissions a user has on a given system.
However, this restriction can be bypassed, allowing a user to elevate their privileges on one system to the privileges they may have on another, effectively ignoring the host identifier in any sudoers rules.
This vulnerability is particularly impactful for systems that share a single sudoers configuration file across multiple computers or use network-based user directories, such as LDAP, to provide sudoers rules on a system.
OL CVE Issue Summary :
This issue is rated as a moderate severity vulnerability instead of important because it requires specific conditions to be exploitable. First, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default in Red Hat Enterprise Linux (RHEL). Additionally, while the attack allows a machine-in-the-middle (MITM) adversary to trick the client into accepting an incorrect host key, it does not directly lead to code execution or immediate system compromise. Instead, the attack requires additional steps, such as credential interception or session hijacking to fully exploit the breach.
`c-ares` is an asynchronous resolver library. `ares_inet_net_pton()` isvulnerable to a buffer underflow for certain IPv6 addresses, in particular`0::00:00:00/2` was found to cause an issue. `c-ares` only uses this functioninternally for configuration purposes which would require an administrator toconfigure such an address via `ares_set_sortlist()`. However, users mayexternally use `ares_inet_net_pton()` for other purposes and thus be vulnerableto more severe issues.
OL CVE Issue Summary :
A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD. This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c.
Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.