Action not permitted
Modal body text goes here.
cve-2024-40094
Vulnerability from cvelistv5
Published
2024-07-30 00:00
Modified
2024-11-20 20:13
Severity ?
EPSS score ?
Summary
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-30T14:42:03.528958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-20T20:13:40.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-30T06:24:07.203520", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40094", "datePublished": "2024-07-30T00:00:00", "dateReserved": "2024-07-05T00:00:00", "dateUpdated": "2024-11-20T20:13:40.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-40094\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-07-30T07:15:01.840\",\"lastModified\":\"2024-11-21T09:30:56.560\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.\"},{\"lang\":\"es\",\"value\":\" GraphQL Java (tambi\u00e9n conocido como graphql-java) anterior a 21.5 no considera adecuadamente los ExecutableNormalizedFields (ENF) como parte de la prevenci\u00f3n de la denegaci\u00f3n de servicio mediante consultas de introspecci\u00f3n. 20.9 y 19.11 tambi\u00e9n son versiones fijas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"references\":[{\"url\":\"https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/discussions/3641\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/pull/3539\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v19.11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v20.9\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v21.5\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/discussions/3641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/pull/3539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v19.11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v20.9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v21.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_8329
Vulnerability from csaf_redhat
Published
2024-10-22 15:40
Modified
2024-12-11 14:01
Summary
Red Hat Security Advisory: Red Hat build of Cryostat security update
Notes
Topic
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Security Fix(es):
* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nSecurity Fix(es):\n\n* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)\n* golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)\n* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)\n* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8329", "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8329.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Cryostat security update", "tracking": { "current_release_date": "2024-12-11T14:01:48+00:00", "generator": { "date": "2024-12-11T14:01:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8329", "initial_release_date": "2024-10-22T15:40:25+00:00", "revision_history": [ { "date": "2024-10-22T15:40:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-22T15:40:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-11T14:01:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cryostat 3 on RHEL 8", "product": { "name": "Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:cryostat:3::el8" } } } ], "category": "product_family", "name": "Cryostat" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "relates_to_product_reference": "8Base-Cryostat-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34155", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:06.929766+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310527" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34155" }, { "category": "external", "summary": "RHBZ#2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155" }, { "category": "external", "summary": "https://go.dev/cl/611238", "url": "https://go.dev/cl/611238" }, { "category": "external", "summary": "https://go.dev/issue/69138", "url": "https://go.dev/issue/69138" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3105", "url": "https://pkg.go.dev/vuln/GO-2024-3105" } ], "release_date": "2024-09-06T21:15:11.947000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion" }, { "cve": "CVE-2024-34156", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:09.377905+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310528" } ], "notes": [ { "category": "description", "text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", "title": "Vulnerability description" }, { "category": "summary", "text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34156" }, { "category": "external", "summary": "RHBZ#2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156" }, { "category": "external", "summary": "https://go.dev/cl/611239", "url": "https://go.dev/cl/611239" }, { "category": "external", "summary": "https://go.dev/issue/69139", "url": "https://go.dev/issue/69139" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3106", "url": "https://pkg.go.dev/vuln/GO-2024-3106" } ], "release_date": "2024-09-06T21:15:12.020000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-34158", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2024-09-06T21:20:12.126400+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310529" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34158" }, { "category": "external", "summary": "RHBZ#2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158" }, { "category": "external", "summary": "https://go.dev/cl/611240", "url": "https://go.dev/cl/611240" }, { "category": "external", "summary": "https://go.dev/issue/69141", "url": "https://go.dev/issue/69141" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3107", "url": "https://pkg.go.dev/vuln/GO-2024-3107" } ], "release_date": "2024-09-06T21:15:12.083000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" } ] }
rhsa-2024_7676
Vulnerability from csaf_redhat
Published
2024-10-10 13:43
Modified
2024-12-06 13:14
Summary
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update
Notes
Topic
An update is now available for Red Hat build of Quarkus.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.
Details
This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes
page listed in the References section.
Security Fix(es):
* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)
* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)
* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Quarkus. \nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability. For\nmore information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes\npage listed in the References section.\n\nSecurity Fix(es):\n\n* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)\n\n* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\n* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7676", "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7676.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update", "tracking": { "current_release_date": "2024-12-06T13:14:07+00:00", "generator": { "date": "2024-12-06T13:14:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.2" } }, "id": "RHSA-2024:7676", "initial_release_date": "2024-10-10T13:43:59+00:00", "revision_history": [ { "date": "2024-10-10T13:43:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-10T13:43:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-06T13:14:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Quarkus 3.2", "product": { "name": "Red Hat build of Quarkus 3.2", "product_id": "Red Hat build of Quarkus 3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:quarkus:3.2::el8" } } } ], "category": "product_family", "name": "Red Hat build of Quarkus" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44549", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2024-10-01T01:34:34.576000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2315808" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Sling Commons Messaging Mail(angus-mail), which provides a simple interface for sending emails via SMTPS in OSGi, does not offer an option to enable server identity checks, leaving connections vulnerable to \"man-in-the-middle\" attacks and can allow insecure email communication.", "title": "Vulnerability description" }, { "category": "summary", "text": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability should be considered of important severity rather than moderate because it directly impacts the integrity and confidentiality of email communications over SMTPS. By disabling server identity checks, it leaves the communication channel vulnerable to \"man-in-the-middle\" (MITM) attacks, where an attacker could intercept, alter, or eavesdrop on email traffic by impersonating the legitimate mail server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44549" }, { "category": "external", "summary": "RHBZ#2315808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44549", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549" } ], "release_date": "2023-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
ghsa-h9mq-f6q5-6c8m
Vulnerability from github
Published
2024-07-30 09:31
Modified
2024-07-30 15:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service
Details
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "19.11" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "20.0" }, { "fixed": "20.9" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "21.0" }, { "fixed": "21.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-40094" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2024-07-30T15:08:48Z", "nvd_published_at": "2024-07-30T07:15:01Z", "severity": "HIGH" }, "details": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.", "id": "GHSA-h9mq-f6q5-6c8m", "modified": "2024-07-30T15:08:48Z", "published": "2024-07-30T09:31:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/16c159111507ef04d7e1839b2c23281d90c42b2b" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/469caf6ee600ab6709ad5e8a06f371fe2ef3b8dd" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/fc6f304e66cab18b6d06a80c7009524938939a03" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service" }
wid-sec-w-2024-3365
Vulnerability from csaf_certbund
Published
2024-11-06 23:00
Modified
2024-11-06 23:00
Summary
IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM WebSphere Application Server ist ein J2EE-Applikationsserver.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM WebSphere Application Server Liberty ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM WebSphere Application Server Liberty ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3365 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3365.json" }, { "category": "self", "summary": "WID-SEC-2024-3365 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3365" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-11-06", "url": "https://www.ibm.com/support/pages/node/7174997" } ], "source_lang": "en-US", "title": "IBM WebSphere Application Server Liberty: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-11-06T23:00:00.000+00:00", "generator": { "date": "2024-11-07T10:38:31.738+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-3365", "initial_release_date": "2024-11-06T23:00:00.000+00:00", "revision_history": [ { "date": "2024-11-06T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "Liberty 20.0.0.6-24.0.0.11", "product": { "name": "IBM WebSphere Application Server Liberty 20.0.0.6-24.0.0.11", "product_id": "T038843", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:liberty_20.0.0.6_-_24.0.0.11" } } } ], "category": "product_name", "name": "WebSphere Application Server" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40094", "notes": [ { "category": "description", "text": "Es gibt eine Schwachstelle in IBM WebSphere Application Server Liberty, die die verwendete GraphQL Java Bibliothek betrifft. Dies wird durch eine unsachgem\u00e4\u00dfe Eingabevalidierung bez\u00fcglich \u201eExecutableNormalizedFields\u201c verursacht. Ein entfernter, anonymer Angreifer kann dies ausnutzen, um einen Denial of Service Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T038843" ] }, "release_date": "2024-11-06T23:00:00.000+00:00", "title": "CVE-2024-40094" } ] }
wid-sec-w-2024-3147
Vulnerability from csaf_certbund
Published
2024-10-10 22:00
Modified
2024-11-17 23:00
Summary
Red Hat Produkte: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu können.
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Apache Camel ist ein Integrations-Framework, das Enterprise Integration Patterns implementiert.
JBoss Enterprise Application Platform ist eine skalierbare Plattform für Java-Anwendungen, inklusive JBoss Application Server, JBoss Hibernate und Boss Seam.
Red Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank für den schnellen Zugriff auf große Datenvolumen und Skalierbarkeit.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Red Hat-Produkten ausnutzen, um Dateien zu manipulieren, beliebigen Code auszuführen und einen Denial-of-Service-Zustand zu erzeugen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.\r\nRed Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu k\u00f6nnen.\r\nRed Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.\r\nApache Camel ist ein Integrations-Framework, das Enterprise Integration Patterns implementiert.\r\nJBoss Enterprise Application Platform ist eine skalierbare Plattform f\u00fcr Java-Anwendungen, inklusive JBoss Application Server, JBoss Hibernate und Boss Seam.\r\nRed Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank f\u00fcr den schnellen Zugriff auf gro\u00dfe Datenvolumen und Skalierbarkeit.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Red Hat-Produkten ausnutzen, um Dateien zu manipulieren, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3147 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3147.json" }, { "category": "self", "summary": "WID-SEC-2024-3147 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3147" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-10-10", "url": "https://access.redhat.com/errata/RHSA-2024:7670" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-10-10", "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-10-10", "url": "https://access.redhat.com/errata/RHSA-2024:7972" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8093 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8329 vom 2024-10-22", "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2693 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2693.html" } ], "source_lang": "en-US", "title": "Red Hat Produkte: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-17T23:00:00.000+00:00", "generator": { "date": "2024-11-18T09:05:05.904+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-3147", "initial_release_date": "2024-10-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "3", "summary": "Anpassung im Text" }, { "date": "2024-10-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Apache Camel", "product": { "name": "Apache Camel", "product_id": "T038266", "product_identification_helper": { "cpe": "cpe:/a:apache:camel:-" } } } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Cryostat 3", "product": { "name": "Red Hat Enterprise Linux Cryostat 3", "product_id": "T036943", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:cryostat_3" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T038260", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T038261", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T038262", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } }, { "category": "product_version", "name": "AI", "product": { "name": "Red Hat Enterprise Linux AI", "product_id": "T038263", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:ai" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "8", "product": { "name": "Red Hat JBoss Data Grid 8", "product_id": "T038268", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:8" } } } ], "category": "product_name", "name": "JBoss Data Grid" }, { "branches": [ { "category": "product_version_range", "name": "Quarkus \u003c3.8.6.SP1", "product": { "name": "Red Hat JBoss Enterprise Application Platform Quarkus \u003c3.8.6.SP1", "product_id": "T038267" } }, { "category": "product_version", "name": "Quarkus 3.8.6.SP1", "product": { "name": "Red Hat JBoss Enterprise Application Platform Quarkus 3.8.6.SP1", "product_id": "T038267-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:quarkus__3.8.6.sp1" } } }, { "category": "product_version_range", "name": "Quarkus \u003c3.2.12.SP1", "product": { "name": "Red Hat JBoss Enterprise Application Platform Quarkus \u003c3.2.12.SP1", "product_id": "T038269" } }, { "category": "product_version", "name": "Quarkus 3.2.12.SP1", "product": { "name": "Red Hat JBoss Enterprise Application Platform Quarkus 3.2.12.SP1", "product_id": "T038269-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:quarkus__3.2.12.sp1" } } } ], "category": "product_name", "name": "JBoss Enterprise Application Platform" }, { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T038265", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "branches": [ { "category": "product_version", "name": "16.2", "product": { "name": "Red Hat OpenStack 16.2", "product_id": "T038264", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44549", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in mehreren Red-Hat-Produkten. Dieser Fehler betrifft die Apache Sling Commons Messaging Mail Komponente aufgrund der fehlenden Server-Identit\u00e4tspr\u00fcfung. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er einen Man-in-the-Middle-Angriff durchf\u00fchrt und so den E-Mail-Verkehr abf\u00e4ngt, ver\u00e4ndert oder abh\u00f6rt, indem er sich als legitimer Mailserver ausgibt." } ], "product_status": { "known_affected": [ "67646", "T036943", "T038269", "T038265", "T038266", "T038267", "T038268", "T038261", "T038262", "T038263", "T038264", "T038260", "398363" ] }, "release_date": "2024-10-10T22:00:00.000+00:00", "title": "CVE-2021-44549" }, { "cve": "CVE-2024-40094", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in mehreren Red-Hat-Produkten. Dieser Fehler betrifft die GraphQL-Java-Komponente aufgrund einer unsachgem\u00e4\u00dfen Behandlung von ExecutableNormalizedFields (ENFs) w\u00e4hrend Introspektionsabfragen, was zu einer Ersch\u00f6pfung der Ressourcen f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "67646", "T036943", "T038269", "T038265", "T038266", "T038267", "T038268", "T038261", "T038262", "T038263", "T038264", "T038260", "398363" ] }, "release_date": "2024-10-10T22:00:00.000+00:00", "title": "CVE-2024-40094" }, { "cve": "CVE-2024-47561", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in mehreren Red-Hat-Produkten. Dieser Fehler betrifft die Apache-Avro-Komponente aufgrund einer unsachgem\u00e4\u00dfen Behandlung von vom Benutzer bereitgestellten Avro-Schemata, wenn diese das spezielle \u201ejava-class\u201c-Attribut enthalten, was b\u00f6sartige Eingaben erm\u00f6glicht. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren, indem er das Parsen eines manipulierten Avro-Schemas ausnutzt." } ], "product_status": { "known_affected": [ "67646", "T036943", "T038269", "T038265", "T038266", "T038267", "T038268", "T038261", "T038262", "T038263", "T038264", "T038260", "398363" ] }, "release_date": "2024-10-10T22:00:00.000+00:00", "title": "CVE-2024-47561" }, { "cve": "CVE-2024-7254", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in mehreren Red-Hat-Produkten. Dieser Fehler besteht aufgrund einer unbegrenzten Rekursion beim Parsen von Protokollpufferdaten, die beliebig verschachtelte SGROUP-Tags enthalten, was zu einem Stapel\u00fcberlauf f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "67646", "T036943", "T038269", "T038265", "T038266", "T038267", "T038268", "T038261", "T038262", "T038263", "T038264", "T038260", "398363" ] }, "release_date": "2024-10-10T22:00:00.000+00:00", "title": "CVE-2024-7254" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.