Skip to main content

Oracle Critical Patch Update Advisory - April 2023


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Oracle Critical Patch Update Advisory - April 2023

 

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 433 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2023 Critical Patch Update: Executive Summary and Analysis.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

 

Oracle Blockchain Platform Risk Matrix

This Critical Patch Update contains 7 new security patches, plus additional third party patches noted below, for Oracle Blockchain Platform.  5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2021-23017 Oracle Blockchain Platform BCS Console (nginx) UDP Yes 7.7 Network High None None Un-
changed
High High Low Prior to 21.1.3  
CVE-2022-28327 Oracle Blockchain Platform BCS Console (Golang Go) HTTP Yes 7.5 Network Low None None Un-
changed
None None High Prior to 21.1.3  
CVE-2022-25647 Oracle Blockchain Platform BCS Console (Google Gson) HTTP Yes 7.5 Network Low None None Un-
changed
None None High Prior to 21.1.3  
CVE-2020-35169 Oracle Blockchain Platform BCS Console (Dell BSAFE Micro Edition Suite) Oracle Net Yes 7.4 Network High None None Un-
changed
High High None Prior to 21.1.3  
CVE-2022-32215 Oracle Blockchain Platform BCS Console (Node.js) HTTP Yes 6.5 Network Low None None Un-
changed
Low Low None Prior to 21.1.3  
CVE-2020-36518 Oracle Blockchain Platform BCS Console (jackson-databind) HTTP No 6.5 Network Low Low None Un-
changed
None None High Prior to 21.1.3  
CVE-2021-36090 Oracle Blockchain Platform BCS Console (Apache Commons Compress) HTTP No 4.9 Network Low High None Un-
changed
None None High Prior to 21.1.3  

 

>> Full Article <<

0 replies

Be the first to reply!

Reply