RHSA-2023_0470
Vulnerability from csaf_redhat - Published: 2023-01-26 12:19 - Updated: 2024-11-15 13:21Summary
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
Severity
Important
Notes
Topic: An update is now available for Migration Toolkit for Runtimes (v1.0.1).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details: Security Fix(es):
* mtr-web-container: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.
8.1 (High)
Affected products
Fixed
15 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64 | — |
Vendor Fix
fix
|
Threats
Impact
Important
References
9 references
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Migration Toolkit for Runtimes (v1.0.1).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* mtr-web-container: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0470",
"url": "https://access.redhat.com/errata/RHSA-2023:0470"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0470.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Runtimes security update",
"tracking": {
"current_release_date": "2024-11-15T13:21:36+00:00",
"generator": {
"date": "2024-11-15T13:21:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0470",
"initial_release_date": "2023-01-26T12:19:52+00:00",
"revision_history": [
{
"date": "2023-01-26T12:19:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-26T12:19:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T13:21:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Migration Toolkit for Runtimes 1 on RHEL 8",
"product": {
"name": "Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"product_id": "mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.0-30"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"product_id": "mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.0-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"product_id": "mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.0-15"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.0-14"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"product_id": "mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.0-30"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"product_id": "mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.0-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.0-14"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"product_id": "mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.0-30"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"product_id": "mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.0-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"product_id": "mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.0-15"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.0-14"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"product_id": "mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.0-30"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"product_id": "mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.0-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"product_id": "mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.0-15"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.0-14"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64",
"relates_to_product_reference": "8Base-MTR-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-42920",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142707"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fuse 7 ships the code in question but does not utilize it in the product, so it is affected at a reduced impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42920"
},
{
"category": "external",
"summary": "RHBZ#2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4",
"url": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4"
}
],
"release_date": "2022-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-26T12:19:52+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0470"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:2379b68337e7c30b1a16df2aa114dc4bdd5d92400f2d14718263f77dd5d604c1_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:cbc6a0ebe53a0168b4acbb92c3e96205c3e32288c6795cebef9d96c0492cb4b6_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:d33f26cc2c138d6691bb59b53e8c195b3c7bf472b0f15935f451a5bb08e23fef_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:e43aaeccb5b9fc164fc1efc8187c47c65f264169d9713146a7147774ec865549_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:4f0415ff69c5bb35e424594a25287430f0c725555392a4f3b65808c20c2fc0f3_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:59e047a02d0e940c01497fc85876022db3c2d5be5fab50d4cd3f2d37380f49a4_arm64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:9e4d389dcf4954e12cf99ca9822d49ae4ed89d480172fe97d60192ea88d8a6c8_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ad42b359fdc8556467a325de3a03db7b67814e28d6abb13977f7e39045736832_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:1428ff808b386e83b1605caa8382186f09b8d74e910e8aa02fe48f74da28c72b_s390x",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:40a560bb8aaa885e9ccc83729a3a2464485e40ea92be8e974679af7721f389c9_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:5d1f0364180f972231ad23ebd8dc04218dfcd55973be4ed10587aea2d86fbdb5_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:8431f6f4f034a6c3088e1c4087eabf3097295a1ff808d863c8f2db4c6a5e4b73_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:9d961ea251247afcfbda80eb65178d88fa6c3542de76a43b5cd4eea3dca9492a_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:b539ddfdb09be3f1fe8c0d94949fef4f5d81df5d9a3adefbbef2c432f5f73a94_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:f46c74ef13141dd7deb126e150519584d304df237c84bdcd766ee9dadcc66ab7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…