Vulnerability from csaf_opensuse
Published
2024-12-18 00:00
Modified
2024-12-18 00:00
Summary
govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20241213T205935-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14599
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the govulncheck-vulndb-0.0.20241213T205935-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-14599", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14599-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2024:14599-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2024:14599-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/", }, { category: "self", summary: "SUSE CVE CVE-2020-10696 page", url: "https://www.suse.com/security/cve/CVE-2020-10696/", }, { category: "self", summary: "SUSE CVE CVE-2020-8912 page", url: "https://www.suse.com/security/cve/CVE-2020-8912/", }, { category: "self", summary: "SUSE CVE CVE-2022-31668 page", url: "https://www.suse.com/security/cve/CVE-2022-31668/", }, { category: "self", summary: "SUSE CVE CVE-2023-26248 page", url: "https://www.suse.com/security/cve/CVE-2023-26248/", }, { category: "self", summary: "SUSE CVE CVE-2023-3676 page", url: "https://www.suse.com/security/cve/CVE-2023-3676/", }, { category: "self", summary: "SUSE CVE CVE-2023-3955 page", url: "https://www.suse.com/security/cve/CVE-2023-3955/", }, { category: "self", summary: "SUSE CVE CVE-2024-12401 page", url: "https://www.suse.com/security/cve/CVE-2024-12401/", }, { category: "self", summary: "SUSE CVE CVE-2024-37032 page", url: "https://www.suse.com/security/cve/CVE-2024-37032/", }, { category: "self", summary: "SUSE CVE CVE-2024-44337 page", url: "https://www.suse.com/security/cve/CVE-2024-44337/", }, { category: "self", summary: "SUSE CVE CVE-2024-45039 page", url: "https://www.suse.com/security/cve/CVE-2024-45039/", }, { category: "self", summary: "SUSE CVE CVE-2024-45337 page", url: "https://www.suse.com/security/cve/CVE-2024-45337/", }, { category: "self", summary: "SUSE CVE CVE-2024-45436 page", url: "https://www.suse.com/security/cve/CVE-2024-45436/", }, { category: "self", summary: "SUSE CVE CVE-2024-46455 page", url: "https://www.suse.com/security/cve/CVE-2024-46455/", }, { category: "self", summary: "SUSE CVE CVE-2024-46528 page", url: "https://www.suse.com/security/cve/CVE-2024-46528/", }, { category: "self", summary: "SUSE CVE CVE-2024-53257 page", url: "https://www.suse.com/security/cve/CVE-2024-53257/", }, { category: "self", summary: "SUSE CVE CVE-2024-53859 page", url: "https://www.suse.com/security/cve/CVE-2024-53859/", }, { category: "self", summary: "SUSE CVE CVE-2024-55601 page", url: "https://www.suse.com/security/cve/CVE-2024-55601/", }, { category: "self", summary: "SUSE CVE CVE-2024-55657 page", url: "https://www.suse.com/security/cve/CVE-2024-55657/", }, { category: "self", summary: "SUSE CVE CVE-2024-55658 page", url: "https://www.suse.com/security/cve/CVE-2024-55658/", }, { category: "self", summary: "SUSE CVE CVE-2024-55659 page", url: "https://www.suse.com/security/cve/CVE-2024-55659/", }, { category: "self", summary: "SUSE CVE CVE-2024-55660 page", url: "https://www.suse.com/security/cve/CVE-2024-55660/", }, ], title: "govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media", tracking: { current_release_date: "2024-12-18T00:00:00Z", generator: { date: "2024-12-18T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:14599-1", initial_release_date: "2024-12-18T00:00:00Z", revision_history: [ { date: "2024-12-18T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2020-10696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10696", }, ], notes: [ { category: "general", text: "A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10696", url: "https://www.suse.com/security/cve/CVE-2020-10696", }, { category: "external", summary: "SUSE Bug 1167864 for CVE-2020-10696", url: "https://bugzilla.suse.com/1167864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2020-10696", }, { cve: "CVE-2020-8912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8912", }, ], notes: [ { category: "general", text: "A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8912", url: "https://www.suse.com/security/cve/CVE-2020-8912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "low", }, ], title: "CVE-2020-8912", }, { cve: "CVE-2022-31668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31668", }, ], notes: [ { category: "general", text: "Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31668", url: "https://www.suse.com/security/cve/CVE-2022-31668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2022-31668", }, { cve: "CVE-2023-26248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-26248", }, ], notes: [ { category: "general", text: "The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-26248", url: "https://www.suse.com/security/cve/CVE-2023-26248", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-26248", }, { cve: "CVE-2023-3676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3676", }, ], notes: [ { category: "general", text: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3676", url: "https://www.suse.com/security/cve/CVE-2023-3676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2023-3676", }, { cve: "CVE-2023-3955", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3955", }, ], notes: [ { category: "general", text: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3955", url: "https://www.suse.com/security/cve/CVE-2023-3955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2023-3955", }, { cve: "CVE-2024-12401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-12401", }, ], notes: [ { category: "general", text: "A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-12401", url: "https://www.suse.com/security/cve/CVE-2024-12401", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-12401", }, { cve: "CVE-2024-37032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-37032", }, ], notes: [ { category: "general", text: "Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-37032", url: "https://www.suse.com/security/cve/CVE-2024-37032", }, { category: "external", summary: "SUSE Bug 1225724 for CVE-2024-37032", url: "https://bugzilla.suse.com/1225724", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-37032", }, { cve: "CVE-2024-44337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-44337", }, ], notes: [ { category: "general", text: "The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-44337", url: "https://www.suse.com/security/cve/CVE-2024-44337", }, { category: "external", summary: "SUSE Bug 1231713 for CVE-2024-44337", url: "https://bugzilla.suse.com/1231713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-44337", }, { cve: "CVE-2024-45039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45039", }, ], notes: [ { category: "general", text: "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark uses the commitments for optimized non-native multiplication, lookup checks etc. as random challenges, then it could impact the soundness of the whole circuit. However, using multiple commitments has been discouraged due to the additional cost to the verifier and it has not been supported in the recursive in-circuit Groth16 verifier and Solidity verifier. gnark's maintainers expect the impact of the issue be very small - only for the users who have implemented the native Groth16 verifier or are using it with multiple commitments. We do not have information of such users. The issue has been patched in version 0.11.0. As a workaround, users should follow gnark maintainers' recommendation to use only a single commitment and then derive in-circuit commitments as needed using the `std/multicommit` package.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45039", url: "https://www.suse.com/security/cve/CVE-2024-45039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-45039", }, { cve: "CVE-2024-45337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45337", }, ], notes: [ { category: "general", text: "Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45337", url: "https://www.suse.com/security/cve/CVE-2024-45337", }, { category: "external", summary: "SUSE Bug 1234482 for CVE-2024-45337", url: "https://bugzilla.suse.com/1234482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-45337", }, { cve: "CVE-2024-45436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45436", }, ], notes: [ { category: "general", text: "extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45436", url: "https://www.suse.com/security/cve/CVE-2024-45436", }, { category: "external", summary: "SUSE Bug 1229895 for CVE-2024-45436", url: "https://bugzilla.suse.com/1229895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-45436", }, { cve: "CVE-2024-46455", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-46455", }, ], notes: [ { category: "general", text: "unstructured v.0.14.2 and before is vulnerable to XML External Entity (XXE) via the XMLParser.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-46455", url: "https://www.suse.com/security/cve/CVE-2024-46455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "critical", }, ], title: "CVE-2024-46455", }, { cve: "CVE-2024-46528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-46528", }, ], notes: [ { category: "general", text: "An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere 4.x before 4.1.3 and 3.x through 3.4.1 and KubeSphere Enterprise 4.x before 4.1.3 and 3.x through 3.5.0 allows low-privileged authenticated attackers to access sensitive resources without proper authorization checks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-46528", url: "https://www.suse.com/security/cve/CVE-2024-46528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-46528", }, { cve: "CVE-2024-53257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53257", }, ], notes: [ { category: "general", text: "Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53257", url: "https://www.suse.com/security/cve/CVE-2024-53257", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-53257", }, { cve: "CVE-2024-53859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53859", }, ], notes: [ { category: "general", text: "go-gh is a Go module for interacting with the `gh` utility and the GitHub API from the command line. A security vulnerability has been identified in `go-gh` that could leak authentication tokens intended for GitHub hosts to non-GitHub hosts when within a codespace. `go-gh` sources authentication tokens from different environment variables depending on the host involved: 1. `GITHUB_TOKEN`, `GH_TOKEN` for GitHub.com and ghe.com and 2. `GITHUB_ENTERPRISE_TOKEN`, `GH_ENTERPRISE_TOKEN` for GitHub Enterprise Server. Prior to version `2.11.1`, `auth.TokenForHost` could source a token from the `GITHUB_TOKEN` environment variable for a host other than GitHub.com or ghe.com when within a codespace. In version `2.11.1`, `auth.TokenForHost` will only source a token from the `GITHUB_TOKEN` environment variable for GitHub.com or ghe.com hosts. Successful exploitation could send authentication token to an unintended host. This issue has been addressed in version 2.11.1 and all users are advised to upgrade. Users are also advised to regenerate authentication tokens and to review their personal security log and any relevant audit logs for actions associated with their account or enterprise.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53859", url: "https://www.suse.com/security/cve/CVE-2024-53859", }, { category: "external", summary: "SUSE Bug 1233976 for CVE-2024-53859", url: "https://bugzilla.suse.com/1233976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-53859", }, { cve: "CVE-2024-55601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55601", }, ], notes: [ { category: "general", text: "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55601", url: "https://www.suse.com/security/cve/CVE-2024-55601", }, { category: "external", summary: "SUSE Bug 1234340 for CVE-2024-55601", url: "https://bugzilla.suse.com/1234340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-55601", }, { cve: "CVE-2024-55657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55657", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55657", url: "https://www.suse.com/security/cve/CVE-2024-55657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55657", }, { cve: "CVE-2024-55658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55658", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55658", url: "https://www.suse.com/security/cve/CVE-2024-55658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55658", }, { cve: "CVE-2024-55659", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55659", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, the `/api/asset/upload` endpoint in Siyuan is vulnerable to both arbitrary file write to the host and stored cross-site scripting (via the file write). Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55659", url: "https://www.suse.com/security/cve/CVE-2024-55659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55659", }, { cve: "CVE-2024-55660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55660", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's `/api/template/renderSprig` endpoint is vulnerable to Server-Side Template Injection (SSTI) through the Sprig template engine. Although the engine has limitations, it allows attackers to access environment variables. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55660", url: "https://www.suse.com/security/cve/CVE-2024-55660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-55660", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.