Skip to content

How to Validate HySecure OS Package Vulnerabilities

Applies To: HySecure 7.0 and above

Category: Security Validation & Compliance

Document Status: Active

Executive Summary

This guide provides a systematic procedure for validating HySecure OS package vulnerabilities, enabling accurate security assessments and compliance reporting.

Prerequisites

System Access Requirements

  • SSH access to HySecure gateway systems

  • Administrative privileges for package queries

  • Internet access for Oracle ELSA advisory lookup

Required Tools

  • VAPT (Vulnerability Assessment Penetration Testing) sheet with CVE data

  • Terminal access with an SSH client

  • Web browser for advisory research

Procedure Part 1: Verify Backported Fixes

Business Context

Backported fixes enable vendors to address security vulnerabilities without requiring an upgrade to the entire package versions. This validation confirms whether security patches are already applied, preventing unnecessary remediation efforts.

Step 1: Access Vulnerability Data

  1. Open VAPT Assessment Sheet

    • Navigate to the Vulnerability CVE IDs column.

    • Identify specific CVE identifiers for validation.

  2. Establish Gateway Connection

    • SSH into the target HySecure gateway system with the vpnsadmin user.

Step 2: Execute CVE Changelog Verification

  1. Run CVE Detection Command

    • For each CVE ID from your VAPT sheet, execute: rpm -qa --changelog | grep 'CVE ID'

      Example:

      rpm -qa --changelog | grep CVE-2024-1234
      
  2. Interpret Command Results

    • Scenario A: CVE Found in Changelog

      • If the command returns output, the backported fix is applied.

      • Document the result as Vulnerability Addressed.

      • Include the timestamp and package information in audit documentation.

    • Scenario B: No Direct CVE Reference

      • Empty output doesn't necessarily indicate missing fixes.

      • CVE may be referenced under Red Hat advisory IDs (RHEL-xxxxx).

      • Proceed to alternative verification methods.

  3. Handle Alternative Documentation Methods

    • Some vendors document fixes using internal advisory references instead of direct CVE mentions.

    Search for RHEL Advisory References:

        rpm -qa --changelog | grep RHEL-
    

    Example: Changelog showing RHEL advisory references instead of direct CVE mentions

Cross-reference these advisory IDs with CVE mappings for detailed confirmation.

Procedure Part 2: Determine Fix Release Timeline

Business Context

Understanding when security fixes become available helps distinguish between genuinely open vulnerabilities and those addressed in recent updates that have not yet been reflected in current assessments.

Step 1: Access Vulnerability Reference Data

  1. Locate Reference Information

    • In the VAPT sheet, find the Vulnerability Reference IDs column.

    • Copy the specific Reference ID for research.

    • Prepare for Oracle ELSA advisory lookup.

  2. Conduct Advisory Research

    • Search the Reference ID using a web browser.

    • Navigate to official Oracle ELSA (Enterprise Linux Security Advisory) resources.

    • Locate the corresponding security advisory.

Step 2: Analyze Oracle ELSA Advisory Details

Oracle ELSA Advisory Components

  • Advisory ID: Unique identifier (e.g., ELSA-2025-7422).

  • Affected Components: Specific packages and versions impacted.

  • CVE Mappings: Direct correlation to vulnerability identifiers.

  • Patch Details: Technical implementation information.

  • Severity Assessment: Risk level and impact analysis.

  • Release Date: Official patch availability timestamp.

Step 3: Timeline Validation Analysis

  1. Compare Release Dates

    • Note the ELSA advisory Release Date.

    • Cross-reference with HySecure Fixes Up To date in Release Notes.

    • Example: This hotfix includes package updates and fixes up to May 10, 2025.

    Example: Oracle ELSA advisory showing release date and package information.

  2. Determine Vulnerability Status

    • If Advisory Date > Fixes Date:

      • Vulnerability appearance as open is expected and accurate.

      • Fix will be included in the upcoming OLOS hotfix.

      • Document timeline for next update cycle.

    • If Advisory Date ≤ Fixes Date:

      • The fix should already be applied in the current system.

      • Proceed to version compliance verification.

      • Investigate potential application or detection issues.

Procedure Part 3: Validate Package Version Compliance

Business Context

Final verification ensures that installed package versions meet or exceed the minimum requirements specified in security advisories, confirming complete vulnerability resolution.

Step 1: Identify Required Version

  1. Extract Version Requirements from ELSA

    • Each Oracle ELSA advisory specifies minimum fixed version requirements

    • Document the exact version number needed for CVE resolution

    • Note any architecture-specific requirements

  2. Prepare Version Comparison

    • Understand version numbering scheme (major.minor.patch-release)

    • Prepare for direct version comparison against installed packages

Step 2: Verify Current Installation

  1. Check Installed Package Version

    - rpm -qa | grep <package-name>
    

    Example:

    - rpm -qa | grep kernel
    
  2. Perform Version Compliance Analysis

    • Comparison Criteria:

      • Installed version ≥ ELSA recommended version = CVE Resolved

      • Installed version \< ELSA recommended version = Vulnerability Remains

    Version Analysis Example:

    • Required: kernel-4.18.0-425.3.1.el8

    • Installed: kernel-4.18.0-425.5.2.el8

    • Result: Compliant (installed version higher than required)

    Example: Oracle ELSA advisory showing minimum fixed version requirements

Reference Materials

Command Reference Quick Guide

# CVE changelog search
rpm -qa --changelog | grep <CVE-ID>

# RHEL advisory search  
rpm -qa --changelog | grep RHEL-

# Package version query
rpm -qa | grep <package-name>

# Detailed package information
rpm -qi <package-name>

Support Contacts

  • Technical Issues: Contact HySecure Support Team

  • Accops Product Documentation: Product Documentation

  • Security Advisories: Oracle Security Response Team

  • Compliance Questions: Internal Audit Team

  • Process Improvement: Security Operations Manager