Action not permitted
Modal body text goes here.
CVE-2023-26125
Vulnerability from cvelistv5
Published
2023-05-04 05:00
Modified
2024-08-02 11:39
Severity ?
EPSS score ?
Summary
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
References
▼ | URL | Tags | |
---|---|---|---|
report@snyk.io | https://github.com/gin-gonic/gin/pull/3500 | Exploit, Patch | |
report@snyk.io | https://github.com/gin-gonic/gin/pull/3503 | Issue Tracking, Patch | |
report@snyk.io | https://github.com/gin-gonic/gin/releases/tag/v1.9.0 | Release Notes | |
report@snyk.io | https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b | Patch | |
report@snyk.io | https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285 | Exploit, Patch, Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | github.com/gin-gonic/gin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:39:06.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285" }, { "tags": [ "x_transferred" ], "url": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gin-gonic/gin/pull/3500" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gin-gonic/gin/pull/3503" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "github.com/gin-gonic/gin", "vendor": "n/a", "versions": [ { "lessThan": "1.9.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "t0rchwo0d" } ], "descriptions": [ { "lang": "en", "value": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-04T05:00:01.441Z", "orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "shortName": "snyk" }, "references": [ { "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285" }, { "url": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b" }, { "url": "https://github.com/gin-gonic/gin/pull/3500" }, { "url": "https://github.com/gin-gonic/gin/pull/3503" }, { "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0" } ] } }, "cveMetadata": { "assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "assignerShortName": "snyk", "cveId": "CVE-2023-26125", "datePublished": "2023-05-04T05:00:01.441Z", "dateReserved": "2023-02-20T10:28:48.924Z", "dateUpdated": "2024-08-02T11:39:06.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-26125\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2023-05-04T05:15:09.163\",\"lastModified\":\"2023-11-07T04:09:24.073\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\\r\\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4},{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.2,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gin-gonic:gin:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.9.0\",\"matchCriteriaId\":\"AEC0CA9C-5051-4183-B191-C1EF30CAAC32\"}]}]}],\"references\":[{\"url\":\"https://github.com/gin-gonic/gin/pull/3500\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://github.com/gin-gonic/gin/pull/3503\",\"source\":\"report@snyk.io\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/gin-gonic/gin/releases/tag/v1.9.0\",\"source\":\"report@snyk.io\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b\",\"source\":\"report@snyk.io\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2023_4293
Vulnerability from csaf_redhat
Published
2023-07-27 01:13
Modified
2024-11-08 08:04
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.11 security and bug fix update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.7.11 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es) from Bugzilla:
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
* golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function (CVE-2023-29401)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.7.11 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\n* golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function (CVE-2023-29401)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4293", "url": "https://access.redhat.com/errata/RHSA-2023:4293" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "2216957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216957" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4293.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.11 security and bug fix update", "tracking": { "current_release_date": "2024-11-08T08:04:46+00:00", "generator": { "date": "2024-11-08T08:04:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2023:4293", "initial_release_date": "2023-07-27T01:13:57+00:00", "revision_history": [ { "date": "2023-07-27T01:13:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-27T01:13:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-08T08:04:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.7", "product": { "name": "8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.7::el8" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.11-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "product": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.11-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.11-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.11-1" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.11-1" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "product": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.11-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "product": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.11-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.11-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.11-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.11-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.11-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.11-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.11-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.11-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.11-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.11-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.11-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64" }, "product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64" }, "product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64" }, "product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-27T01:13:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4293" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24539", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196026" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper sanitization of CSS values", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24539" }, { "category": "external", "summary": "RHBZ#2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59720", "url": "https://github.com/golang/go/issues/59720" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-27T01:13:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4293" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper sanitization of CSS values" }, { "cve": "CVE-2023-26125", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2203769" } ], "notes": [ { "category": "description", "text": "A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Improper Input Validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26125" }, { "category": "external", "summary": "RHBZ#2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26125", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125" }, { "category": "external", "summary": "https://www.postgresql.org/support/security/CVE-2023-2454/", "url": "https://www.postgresql.org/support/security/CVE-2023-2454/" } ], "release_date": "2023-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-27T01:13:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4293" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Improper Input Validation" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-29400", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196029" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of empty HTML attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29400" }, { "category": "external", "summary": "RHBZ#2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400" }, { "category": "external", "summary": "https://go.dev/issue/59722", "url": "https://go.dev/issue/59722" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-27T01:13:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4293" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper handling of empty HTML attributes" }, { "cve": "CVE-2023-29401", "cwe": { "id": "CWE-494", "name": "Download of Code Without Integrity Check" }, "discovery_date": "2023-06-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216957" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Gin-Gonic Gin Web Framework. Affected versions of this package could allow a remote attacker to bypass security restrictions caused by improper input validation by the filename parameter of the Context.FileAttachment function. An attacker can modify the Content-Disposition header by using a specially-crafted attachment file name.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:12a30ae012584c98d88bbf5b592c446ef01c99613d2ead6428a7c300379f7bb7_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:d5e4fbece3335736271fd3c397a47b56f486a6bff74828ae3caa1bad71479ea9_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:9bb77c878246943764eadc901a3be355b2e209cad4a847fd991edde8f892def8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:b494d414adaa0f840e5f73fb46a18d8782ce27993f357d0d76f97b0a0869fbdf_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:faa6da69f2c290a593b2a2be7090d6a5f56ea15de6ed1096e4af2b71311d5160_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:e49cdb8a5591edc90a4e2e590848aeca3917c35bd736b442c87dca056526eb9d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:952df168a2a223fc4cb611631ca308633e792d31b20ddeede8ca7be81f875203_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:3698e0abf4745cb21de11f7dd0ca820e18412ba120443f5b1e1fb47ea6f1ab56_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:a9f2b722cac0640c9369652362fb23f36cf871d14f272d5e09ea441992ef44f2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:9e2c212ac1bf3ee88a71dcd7ee8982277c79d0591f804f1fe74e2d2556e6ac39_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:ed877c9443049533ac997f416275d243886686e541fcecc577f24fa67457e82e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:8c364d88218f882fa2d681af9e380eb9d985adb177e3399e449d09edf0905e51_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5f99efaa36d71c97e9efba6dbd75484726df26c096de53abe9c10bec0d830162_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:e4d53ac8ae53d83e3796d910cfa2bf0343fddc1363a4c37c93c7027b8148e3c4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:fa11c3717b862d9da0dfa9fb4f4c9d30af55f893ab0573775d1dc19f93352e8e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:a160bac588b1e86544fe73fa2aef24c26f0e7d491200edf8c4508cfcecb18b9d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29401" }, { "category": "external", "summary": "RHBZ#2216957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29401" } ], "release_date": "2023-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-27T01:13:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4293" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:4acee31f69a7073ff74e57a7951a0a6e82d97599fce50ac4efe085fd213910af_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function" } ] }
rhba-2023_6078
Vulnerability from csaf_redhat
Published
2023-10-24 12:12
Modified
2024-11-09 01:54
Summary
Red Hat Bug Fix Advisory: MTV 2.5.2 Images
Notes
Topic
Updated Release packages that fix several bugs and add various enhancements are now available.
Details
Migration Toolkit for Virtualization 2.5.2 Images
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Release packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Virtualization 2.5.2 Images", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2023:6078", "url": "https://access.redhat.com/errata/RHBA-2023:6078" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhba-2023_6078.json" } ], "title": "Red Hat Bug Fix Advisory: MTV 2.5.2 Images", "tracking": { "current_release_date": "2024-11-09T01:54:04+00:00", "generator": { "date": "2024-11-09T01:54:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2023:6078", "initial_release_date": "2023-10-24T12:12:11+00:00", "revision_history": [ { "date": "2023-10-24T12:12:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-24T12:12:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-09T01:54:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-MTV-2.5", "product": { "name": "8Base-MTV-2.5", "product_id": "9Base-MTV-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" } } }, { "category": "product_name", "name": "8Base-MTV-2.5", "product": { "name": "8Base-MTV-2.5", "product_id": "8Base-MTV-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Virtualization" }, { "branches": [ { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "product_id": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-api-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "product_id": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-console-plugin-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "product_id": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-controller-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "product_id": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-api-rhel8\u0026tag=2.5.2-6" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "product_id": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-rhel8\u0026tag=2.5.2-4" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "product_id": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-openstack-populator-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "product_id": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-operator-bundle\u0026tag=2.5.2-20" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "product_id": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-rhel8-operator\u0026tag=2.5.2-3" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "product_id": "migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-ova-provider-server-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "product_id": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-populator-controller-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "product_id": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-rhv-populator-rhel8\u0026tag=2.5.2-4" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "product_id": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-validation-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64", "product_id": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-rhel9\u0026tag=2.5.2-5" } } }, { "category": "product_version", "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "product": { "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "product_id": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "product_identification_helper": { "purl": "pkg:oci/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8\u0026tag=2.5.2-2" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64 as a component of 8Base-MTV-2.5", "product_id": "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "relates_to_product_reference": "8Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64 as a component of 8Base-MTV-2.5", "product_id": "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "relates_to_product_reference": "8Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64 as a component of 8Base-MTV-2.5", "product_id": "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "relates_to_product_reference": "8Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64 as a component of 8Base-MTV-2.5", "product_id": "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "relates_to_product_reference": "8Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64 as a component of 8Base-MTV-2.5", "product_id": "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "relates_to_product_reference": "8Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "relates_to_product_reference": "9Base-MTV-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64 as a component of 8Base-MTV-2.5", "product_id": "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" }, "product_reference": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64", "relates_to_product_reference": "9Base-MTV-2.5" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "cve": "CVE-2023-26125", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2203769" } ], "notes": [ { "category": "description", "text": "A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Improper Input Validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26125" }, { "category": "external", "summary": "RHBZ#2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26125", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125" }, { "category": "external", "summary": "https://www.postgresql.org/support/security/CVE-2023-2454/", "url": "https://www.postgresql.org/support/security/CVE-2023-2454/" } ], "release_date": "2023-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Improper Input Validation" }, { "cve": "CVE-2023-26144", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-09-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239924" } ], "notes": [ { "category": "description", "text": "A flaw was found in the graphql package. Affected versions of this package are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This issue may allow an attacker to degrade system performance.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26144" }, { "category": "external", "summary": "RHBZ#2239924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26144" }, { "category": "external", "summary": "https://github.com/graphql/graphql-js/commit/f94b511386c7e47bd0380dcd56553dc063320226", "url": "https://github.com/graphql/graphql-js/commit/f94b511386c7e47bd0380dcd56553dc063320226" }, { "category": "external", "summary": "https://github.com/graphql/graphql-js/issues/3955", "url": "https://github.com/graphql/graphql-js/issues/3955" }, { "category": "external", "summary": "https://github.com/graphql/graphql-js/pull/3972", "url": "https://github.com/graphql/graphql-js/pull/3972" }, { "category": "external", "summary": "https://github.com/graphql/graphql-js/releases/tag/v16.8.1", "url": "https://github.com/graphql/graphql-js/releases/tag/v16.8.1" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181", "url": "https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181" } ], "release_date": "2023-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries" }, { "cve": "CVE-2023-29401", "cwe": { "id": "CWE-494", "name": "Download of Code Without Integrity Check" }, "discovery_date": "2023-06-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216957" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Gin-Gonic Gin Web Framework. Affected versions of this package could allow a remote attacker to bypass security restrictions caused by improper input validation by the filename parameter of the Context.FileAttachment function. An attacker can modify the Content-Disposition header by using a specially-crafted attachment file name.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29401" }, { "category": "external", "summary": "RHBZ#2216957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29401" } ], "release_date": "2023-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function" }, { "cve": "CVE-2023-39325", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243296" } ], "notes": [ { "category": "description", "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39325" }, { "category": "external", "summary": "RHBZ#2243296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2023-44487", "url": "https://access.redhat.com/security/cve/CVE-2023-44487" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003" }, { "category": "external", "summary": "https://go.dev/issue/63417", "url": "https://go.dev/issue/63417" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-2102", "url": "https://pkg.go.dev/vuln/GO-2023-2102" }, { "category": "external", "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487" } ], "release_date": "2023-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" }, { "category": "workaround", "details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242803" } ], "notes": [ { "category": "description", "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)", "title": "Vulnerability summary" }, { "category": "other", "text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64" ], "known_not_affected": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-44487" }, { "category": "external", "summary": "RHBZ#2242803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803" }, { "category": "external", "summary": "RHSB-2023-003", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "https://github.com/dotnet/announcements/issues/277", "url": "https://github.com/dotnet/announcements/issues/277" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-2102", "url": "https://pkg.go.dev/vuln/GO-2023-2102" }, { "category": "external", "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487" }, { "category": "external", "summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/", "url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-24T12:12:11+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2023:6078" }, { "category": "workaround", "details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.", "product_ids": [ "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:e1e3b4adafebe14f5c1c17b8b81c921c8c2daf77bf22ffef9f0a2e1ac1a32d5f_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:cfd662d50e649898951b9dc21bb8bd533ccbe4daa9ae9eb1ea365ae9bfdf39e0_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:86e6fc987f49aa419b0c7f15276559c4e0958adc9385d80deef228dfb9bcf0ba_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:bd5cf5ff33a900a8f7b8b4fc52ada3af737d42793b27e63f5cc7c36b11a21189_amd64", "8Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:fd9758985cb3ab4fe6bddf1b989b0cc7803d9bf79883dfe3a02c6c3644fcc891_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:8d9c4e66535b0b3c6921cbf819c7d86dedaa9076fc05b9f00e9002b6fb1c5b1d_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:8fbc5262ebc5791a156ecc4afa539bb6d72bfe3ecf28e7ebaab12aab63e472e3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:ba513f372d1eccbc1a96c0934384021b5cd228533435bcfb70dd584e65f5abec_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-operator-bundle@sha256:9ec2a9e288b742ea9d71f13e055a4ede1b34e5e251aa662c65a83747a6603462_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-ova-provider-server-rhel9@sha256:53f0fa129b04bcb7ea8f80e6136fbaf189460b29bdd123398f456a4d2a32de3f_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:110ebc02ca7aca24ff830e8073af8062434ca8dc8ff1239b92c24e84d6cf08c3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:7481185531e6bba394f769c0e73bfc431e0d763afd23c59bacc8ec32875b0af3_amd64", "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:094c261ca283ee4fcf58e79cc93e61da6e0759c82a157f3169c4390a7e7f1f74_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTV-2.5:migration-toolkit-virtualization/mtv-api-rhel9@sha256:7a25dd92fb3949f6b231d8019dda8ee2432ce1708cf746fdc805f335d19119e8_amd64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-10-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)" } ] }
rhsa-2023_4627
Vulnerability from csaf_redhat
Published
2023-08-14 01:02
Modified
2024-11-06 19:53
Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 6.2.0 release
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 6.2.0 Images
Security Fix(es):
* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)
* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)
* x/net/http2/h2c: request smuggling (CVE-2022-41721)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)
* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)
* htmlUnit: Stack overflow crash causes Denial of Service (DoS) (CVE-2023-2798)
* zip4j: does not always check the MAC when decrypting a ZIP archive (CVE-2023-22899)
* golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results (CVE-2023-24532)
* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
* fast-xml-parser: Regex Injection via Doctype Entities (CVE-2023-34104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Migration Toolkit for Applications 6.2.0 release\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Applications 6.2.0 Images\n\nSecurity Fix(es):\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n\n* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* x/net/http2/h2c: request smuggling (CVE-2022-41721)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* htmlUnit: Stack overflow crash causes Denial of Service (DoS) (CVE-2023-2798)\n\n* zip4j: does not always check the MAC when decrypting a ZIP archive (CVE-2023-22899)\n\n* golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results (CVE-2023-24532)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\n* fast-xml-parser: Regex Injection via Doctype Entities (CVE-2023-34104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4627", "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2151988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988" }, { "category": "external", "summary": "2153260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260" }, { "category": "external", "summary": "2153379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379" }, { "category": "external", "summary": "2162182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162182" }, { "category": "external", "summary": "2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "external", "summary": "2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "2185278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185278" }, { "category": "external", "summary": "2185707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185707" }, { "category": "external", "summary": "2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "2210366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210366" }, { "category": "external", "summary": "2221261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221261" }, { "category": "external", "summary": "2223355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355" }, { "category": "external", "summary": "MTA-1015", "url": "https://issues.redhat.com/browse/MTA-1015" }, { "category": "external", "summary": "MTA-1041", "url": "https://issues.redhat.com/browse/MTA-1041" }, { "category": "external", "summary": "MTA-194", "url": "https://issues.redhat.com/browse/MTA-194" }, { "category": "external", "summary": "MTA-24", "url": "https://issues.redhat.com/browse/MTA-24" }, { "category": "external", "summary": "MTA-27", "url": "https://issues.redhat.com/browse/MTA-27" }, { "category": "external", "summary": "MTA-464", "url": "https://issues.redhat.com/browse/MTA-464" }, { "category": "external", "summary": "MTA-465", "url": "https://issues.redhat.com/browse/MTA-465" }, { "category": "external", "summary": "MTA-468", "url": "https://issues.redhat.com/browse/MTA-468" }, { "category": "external", "summary": "MTA-469", "url": "https://issues.redhat.com/browse/MTA-469" }, { "category": "external", "summary": "MTA-470", "url": "https://issues.redhat.com/browse/MTA-470" }, { "category": "external", "summary": "MTA-472", "url": "https://issues.redhat.com/browse/MTA-472" }, { "category": "external", "summary": "MTA-474", "url": "https://issues.redhat.com/browse/MTA-474" }, { "category": "external", "summary": "MTA-476", "url": "https://issues.redhat.com/browse/MTA-476" }, { "category": "external", "summary": "MTA-477", "url": "https://issues.redhat.com/browse/MTA-477" }, { "category": "external", "summary": "MTA-478", "url": "https://issues.redhat.com/browse/MTA-478" }, { "category": "external", "summary": "MTA-479", "url": "https://issues.redhat.com/browse/MTA-479" }, { "category": "external", "summary": "MTA-480", "url": "https://issues.redhat.com/browse/MTA-480" }, { "category": "external", "summary": "MTA-481", "url": "https://issues.redhat.com/browse/MTA-481" }, { "category": "external", "summary": "MTA-483", "url": "https://issues.redhat.com/browse/MTA-483" }, { "category": "external", "summary": "MTA-484", "url": "https://issues.redhat.com/browse/MTA-484" }, { "category": "external", "summary": "MTA-485", "url": "https://issues.redhat.com/browse/MTA-485" }, { "category": "external", "summary": "MTA-500", "url": "https://issues.redhat.com/browse/MTA-500" }, { "category": "external", "summary": "MTA-582", "url": "https://issues.redhat.com/browse/MTA-582" }, { "category": "external", "summary": "MTA-590", "url": "https://issues.redhat.com/browse/MTA-590" }, { "category": "external", "summary": "MTA-643", "url": "https://issues.redhat.com/browse/MTA-643" }, { "category": "external", "summary": "MTA-647", "url": "https://issues.redhat.com/browse/MTA-647" }, { "category": "external", "summary": "MTA-651", "url": "https://issues.redhat.com/browse/MTA-651" }, { "category": "external", "summary": "MTA-658", "url": "https://issues.redhat.com/browse/MTA-658" }, { "category": "external", "summary": "MTA-659", "url": "https://issues.redhat.com/browse/MTA-659" }, { "category": "external", "summary": "MTA-674", "url": "https://issues.redhat.com/browse/MTA-674" }, { "category": "external", "summary": "MTA-678", "url": "https://issues.redhat.com/browse/MTA-678" }, { "category": "external", "summary": "MTA-680", "url": "https://issues.redhat.com/browse/MTA-680" }, { "category": "external", "summary": "MTA-681", "url": "https://issues.redhat.com/browse/MTA-681" }, { "category": "external", "summary": "MTA-682", "url": "https://issues.redhat.com/browse/MTA-682" }, { "category": "external", "summary": "MTA-695", "url": "https://issues.redhat.com/browse/MTA-695" }, { "category": "external", "summary": "MTA-698", "url": "https://issues.redhat.com/browse/MTA-698" }, { "category": "external", "summary": "MTA-699", "url": "https://issues.redhat.com/browse/MTA-699" }, { "category": "external", "summary": "MTA-706", "url": "https://issues.redhat.com/browse/MTA-706" }, { "category": "external", "summary": "MTA-717", "url": "https://issues.redhat.com/browse/MTA-717" }, { "category": "external", "summary": "MTA-739", "url": "https://issues.redhat.com/browse/MTA-739" }, { "category": "external", "summary": "MTA-741", "url": "https://issues.redhat.com/browse/MTA-741" }, { "category": "external", "summary": "MTA-747", "url": "https://issues.redhat.com/browse/MTA-747" }, { "category": "external", "summary": "MTA-750", "url": "https://issues.redhat.com/browse/MTA-750" }, { "category": "external", "summary": "MTA-753", "url": "https://issues.redhat.com/browse/MTA-753" }, { "category": "external", "summary": "MTA-761", "url": "https://issues.redhat.com/browse/MTA-761" }, { "category": "external", "summary": "MTA-764", "url": "https://issues.redhat.com/browse/MTA-764" }, { "category": "external", "summary": "MTA-765", "url": "https://issues.redhat.com/browse/MTA-765" }, { "category": "external", "summary": "MTA-766", "url": "https://issues.redhat.com/browse/MTA-766" }, { "category": "external", "summary": "MTA-772", "url": "https://issues.redhat.com/browse/MTA-772" }, { "category": "external", "summary": "MTA-773", "url": "https://issues.redhat.com/browse/MTA-773" }, { "category": "external", "summary": "MTA-778", "url": "https://issues.redhat.com/browse/MTA-778" }, { "category": "external", "summary": "MTA-802", "url": "https://issues.redhat.com/browse/MTA-802" }, { "category": "external", "summary": "MTA-807", "url": "https://issues.redhat.com/browse/MTA-807" }, { "category": "external", "summary": "MTA-808", "url": "https://issues.redhat.com/browse/MTA-808" }, { "category": "external", "summary": "MTA-809", "url": "https://issues.redhat.com/browse/MTA-809" }, { "category": "external", "summary": "MTA-81", "url": "https://issues.redhat.com/browse/MTA-81" }, { "category": "external", "summary": "MTA-811", "url": "https://issues.redhat.com/browse/MTA-811" }, { "category": "external", "summary": "MTA-814", "url": "https://issues.redhat.com/browse/MTA-814" }, { "category": "external", "summary": "MTA-815", "url": "https://issues.redhat.com/browse/MTA-815" }, { "category": "external", "summary": "MTA-826", "url": "https://issues.redhat.com/browse/MTA-826" }, { "category": "external", "summary": "MTA-83", "url": "https://issues.redhat.com/browse/MTA-83" }, { "category": "external", "summary": "MTA-84", "url": "https://issues.redhat.com/browse/MTA-84" }, { "category": "external", "summary": "MTA-845", "url": "https://issues.redhat.com/browse/MTA-845" }, { "category": "external", "summary": "MTA-863", "url": "https://issues.redhat.com/browse/MTA-863" }, { "category": "external", "summary": "MTA-870", "url": "https://issues.redhat.com/browse/MTA-870" }, { "category": "external", "summary": "MTA-872", "url": "https://issues.redhat.com/browse/MTA-872" }, { "category": "external", "summary": "MTA-873", "url": "https://issues.redhat.com/browse/MTA-873" }, { "category": "external", "summary": "MTA-877", "url": "https://issues.redhat.com/browse/MTA-877" }, { "category": "external", "summary": "MTA-881", "url": "https://issues.redhat.com/browse/MTA-881" }, { "category": "external", "summary": "MTA-89", "url": "https://issues.redhat.com/browse/MTA-89" }, { "category": "external", "summary": "MTA-894", "url": "https://issues.redhat.com/browse/MTA-894" }, { "category": "external", "summary": "MTA-895", "url": "https://issues.redhat.com/browse/MTA-895" }, { "category": "external", "summary": "MTA-898", "url": "https://issues.redhat.com/browse/MTA-898" }, { "category": "external", "summary": "MTA-906", "url": "https://issues.redhat.com/browse/MTA-906" }, { "category": "external", "summary": "MTA-908", "url": "https://issues.redhat.com/browse/MTA-908" }, { "category": "external", "summary": "MTA-909", "url": "https://issues.redhat.com/browse/MTA-909" }, { "category": "external", "summary": "MTA-91", "url": "https://issues.redhat.com/browse/MTA-91" }, { "category": "external", "summary": "MTA-912", "url": "https://issues.redhat.com/browse/MTA-912" }, { "category": "external", "summary": "MTA-916", "url": "https://issues.redhat.com/browse/MTA-916" }, { "category": "external", "summary": "MTA-923", "url": "https://issues.redhat.com/browse/MTA-923" }, { "category": "external", "summary": "MTA-93", "url": "https://issues.redhat.com/browse/MTA-93" }, { "category": "external", "summary": "MTA-937", "url": "https://issues.redhat.com/browse/MTA-937" }, { "category": "external", "summary": "MTA-943", "url": "https://issues.redhat.com/browse/MTA-943" }, { "category": "external", "summary": "MTA-973", "url": "https://issues.redhat.com/browse/MTA-973" }, { "category": "external", "summary": "MTA-974", "url": "https://issues.redhat.com/browse/MTA-974" }, { "category": "external", "summary": "MTA-984", "url": "https://issues.redhat.com/browse/MTA-984" }, { "category": "external", "summary": "MTA-985", "url": "https://issues.redhat.com/browse/MTA-985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4627.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update", "tracking": { "current_release_date": "2024-11-06T19:53:39+00:00", "generator": { "date": "2024-11-06T19:53:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2023:4627", "initial_release_date": "2023-08-14T01:02:25+00:00", "revision_history": [ { "date": "2023-08-14T01:02:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-08-14T01:02:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T19:53:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el9" } } }, { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Applications" }, { "branches": [ { "category": "product_version", "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product": { "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product_id": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=6.2.0-16" } } }, { "category": "product_version", "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product": { "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product_id": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=6.2.0-29" } } }, { "category": "product_version", "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product": { "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product_id": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=6.2.0-12" } } }, { "category": "product_version", "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product": { "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product_id": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-pathfinder-rhel9\u0026tag=6.2.0-5" } } }, { "category": "product_version", "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product": { "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product_id": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=6.2.0-17" } } }, { "category": "product_version", "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product": { "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product_id": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-addon-rhel9\u0026tag=6.2.0-11" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64" }, "product_reference": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "relates_to_product_reference": "8Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" }, "product_reference": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" }, "product_reference": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64" }, "product_reference": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" }, "product_reference": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" }, "product_reference": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "relates_to_product_reference": "9Base-MTA-6.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-46877", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185707" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46877" }, { "category": "external", "summary": "RHBZ#2185707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46877", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46877" } ], "release_date": "2023-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode" }, { "cve": "CVE-2022-4492", "cwe": { "id": "CWE-550", "name": "Server-generated Error Message Containing Sensitive Information" }, "discovery_date": "2022-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153260" } ], "notes": [ { "category": "description", "text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Server identity in https connection is not checked by the undertow client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4492" }, { "category": "external", "summary": "RHBZ#2153260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: Server identity in https connection is not checked by the undertow client" }, { "cve": "CVE-2022-41721", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2023-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2162182" } ], "notes": [ { "category": "description", "text": "A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "x/net/http2/h2c: request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41721" }, { "category": "external", "summary": "RHBZ#2162182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41721" }, { "category": "external", "summary": "https://go.dev/cl/447396", "url": "https://go.dev/cl/447396" }, { "category": "external", "summary": "https://go.dev/issue/56352", "url": "https://go.dev/issue/56352" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1495", "url": "https://pkg.go.dev/vuln/GO-2023-1495" } ], "release_date": "2023-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "x/net/http2/h2c: request smuggling" }, { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "cve": "CVE-2022-41724", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178492" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: large handshake records may cause panics", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a denial of service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41724" }, { "category": "external", "summary": "RHBZ#2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724" }, { "category": "external", "summary": "https://go.dev/cl/468125", "url": "https://go.dev/cl/468125" }, { "category": "external", "summary": "https://go.dev/issue/58001", "url": "https://go.dev/issue/58001" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1570", "url": "https://pkg.go.dev/vuln/GO-2023-1570" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: large handshake records may cause panics" }, { "cve": "CVE-2022-41725", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178488" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41725" }, { "category": "external", "summary": "RHBZ#2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725" }, { "category": "external", "summary": "https://go.dev/cl/468124", "url": "https://go.dev/cl/468124" }, { "category": "external", "summary": "https://go.dev/issue/58006", "url": "https://go.dev/issue/58006" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1569", "url": "https://pkg.go.dev/vuln/GO-2023-1569" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2022-41854", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151988" } ], "notes": [ { "category": "description", "text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "dev-java/snakeyaml: DoS via stack overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41854" }, { "category": "external", "summary": "RHBZ#2151988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41854" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355" }, { "category": "external", "summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355", "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355" } ], "release_date": "2022-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dev-java/snakeyaml: DoS via stack overflow" }, { "cve": "CVE-2022-41881", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2022-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153379" } ], "notes": [ { "category": "description", "text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41881" }, { "category": "external", "summary": "RHBZ#2153379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881" } ], "release_date": "2022-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS" }, { "cve": "CVE-2023-2798", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-05-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2210366" } ], "notes": [ { "category": "description", "text": "A flaw was found in HtmlUnit. This issue may allow a malicious user to supply content to htmlUnit, which could cause a crash by stack overflow, leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "htmlUnit: Stack overflow crash causes Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-2798" }, { "category": "external", "summary": "RHBZ#2210366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2798", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2798" } ], "release_date": "2023-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "htmlUnit: Stack overflow crash causes Denial of Service (DoS)" }, { "cve": "CVE-2023-22899", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2023-01-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185278" } ], "notes": [ { "category": "description", "text": "A flaw was found in Zip4j. In this issue, it does not always check the MAC when decrypting a ZIP archive.", "title": "Vulnerability description" }, { "category": "summary", "text": "zip4j: does not always check the MAC when decrypting a ZIP archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-22899" }, { "category": "external", "summary": "RHBZ#2185278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22899", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22899" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22899", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22899" } ], "release_date": "2023-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "zip4j: does not always check the MAC when decrypting a ZIP archive" }, { "cve": "CVE-2023-24532", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2023-07-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24532" }, { "category": "external", "summary": "RHBZ#2223355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532" }, { "category": "external", "summary": "https://go.dev/cl/471255", "url": "https://go.dev/cl/471255" }, { "category": "external", "summary": "https://go.dev/issue/58647", "url": "https://go.dev/issue/58647" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY", "url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1621", "url": "https://pkg.go.dev/vuln/GO-2023-1621" } ], "release_date": "2023-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results" }, { "cve": "CVE-2023-24534", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184483" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto: denial of service from excessive memory allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24534" }, { "category": "external", "summary": "RHBZ#2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534" }, { "category": "external", "summary": "https://go.dev/issue/58975", "url": "https://go.dev/issue/58975" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto: denial of service from excessive memory allocation" }, { "cve": "CVE-2023-24536", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184482" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses Go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not-affected.\n* The CVE refers to multipart form parsing routine mime/multipart.Reader.ReadForm, which is not used in Grafana, hence it is not-affected.\n* Butane does not parse multipart forms, hence, it is also not-affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24536" }, { "category": "external", "summary": "RHBZ#2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536" }, { "category": "external", "summary": "https://go.dev/issue/59153", "url": "https://go.dev/issue/59153" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2023-24537", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184484" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: Infinite loop in parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24537" }, { "category": "external", "summary": "RHBZ#2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59180", "url": "https://github.com/golang/go/issues/59180" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: Infinite loop in parsing" }, { "cve": "CVE-2023-24538", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184481" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: backticks not treated as string delimiters", "title": "Vulnerability summary" }, { "category": "other", "text": "The described issue involving Go templates and JavaScript template literals poses a moderate severity rather than an important one due to several mitigating factors. Firstly, the vulnerability requires specific conditions to be met: the presence of Go templates within JavaScript template literals. This limits the scope of affected codebases, reducing the likelihood of exploitation. Additionally, the decision to disallow such interactions in future releases of Go indicates a proactive approach to addressing the issue. Furthermore, the affected packages or components within Red Hat Enterprise Linux, such as Conmon, Grafana, and the RHC package, have been assessed and determined not to be impacted due to their specific usage patterns. So the limited scope of affected systems and the absence of exploitation vectors in specific components within Red Hat Enterprise Linux contribute to categorizing the severity of the issue as moderate.\n\nFor Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* The rhc package do not make use of html/template. Hence, it is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24538" }, { "category": "external", "summary": "RHBZ#2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59234", "url": "https://github.com/golang/go/issues/59234" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: backticks not treated as string delimiters" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24539", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196026" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper sanitization of CSS values", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24539" }, { "category": "external", "summary": "RHBZ#2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59720", "url": "https://github.com/golang/go/issues/59720" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper sanitization of CSS values" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24540", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196027" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of JavaScript whitespace", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24540" }, { "category": "external", "summary": "RHBZ#2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540" }, { "category": "external", "summary": "https://go.dev/issue/59721", "url": "https://go.dev/issue/59721" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: html/template: improper handling of JavaScript whitespace" }, { "cve": "CVE-2023-26125", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2203769" } ], "notes": [ { "category": "description", "text": "A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Improper Input Validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26125" }, { "category": "external", "summary": "RHBZ#2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26125", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125" }, { "category": "external", "summary": "https://www.postgresql.org/support/security/CVE-2023-2454/", "url": "https://www.postgresql.org/support/security/CVE-2023-2454/" } ], "release_date": "2023-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Improper Input Validation" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-29400", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196029" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of empty HTML attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29400" }, { "category": "external", "summary": "RHBZ#2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400" }, { "category": "external", "summary": "https://go.dev/issue/59722", "url": "https://go.dev/issue/59722" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper handling of empty HTML attributes" }, { "cve": "CVE-2023-34104", "cwe": { "id": "CWE-917", "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)" }, "discovery_date": "2023-06-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2221261" } ], "notes": [ { "category": "description", "text": "A flaw was found in the fast-XML-parser. The affected versions of fast-XML-parser are vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the Doctype Entities. By sending a specially crafted regex input, a remote attacker can cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "fast-xml-parser: Regex Injection via Doctype Entities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-34104" }, { "category": "external", "summary": "RHBZ#2221261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-34104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34104" }, { "category": "external", "summary": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "category": "external", "summary": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" } ], "release_date": "2023-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fast-xml-parser: Regex Injection via Doctype Entities" } ] }
ghsa-3vp4-m3rf-835h
Vulnerability from github
Published
2023-05-04 06:30
Modified
2023-05-11 14:03
Severity ?
Summary
Improper input validation in github.com/gin-gonic/gin
Details
Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
Note: Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/gin-gonic/gin" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.9.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-26125" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": true, "github_reviewed_at": "2023-05-05T02:20:00Z", "nvd_published_at": "2023-05-04T05:15:09Z", "severity": "MODERATE" }, "details": "Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\n\n**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.", "id": "GHSA-3vp4-m3rf-835h", "modified": "2023-05-11T14:03:52Z", "published": "2023-05-04T06:30:12Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125" }, { "type": "WEB", "url": "https://github.com/gin-gonic/gin/pull/3500" }, { "type": "WEB", "url": "https://github.com/gin-gonic/gin/pull/3503" }, { "type": "WEB", "url": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b" }, { "type": "PACKAGE", "url": "https://github.com/gin-gonic/gin" }, { "type": "WEB", "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ], "summary": "Improper input validation in github.com/gin-gonic/gin" }
gsd-2023-26125
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-26125", "id": "GSD-2023-26125" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-26125" ], "details": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.", "id": "GSD-2023-26125", "modified": "2023-12-13T01:20:54.164797Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "report@snyk.io", "ID": "CVE-2023-26125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "github.com/gin-gonic/gin", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "1.9.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credits": [ { "lang": "en", "value": "t0rchwo0d" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-20", "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285", "refsource": "MISC", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285" }, { "name": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b", "refsource": "MISC", "url": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b" }, { "name": "https://github.com/gin-gonic/gin/pull/3500", "refsource": "MISC", "url": "https://github.com/gin-gonic/gin/pull/3500" }, { "name": "https://github.com/gin-gonic/gin/pull/3503", "refsource": "MISC", "url": "https://github.com/gin-gonic/gin/pull/3503" }, { "name": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0", "refsource": "MISC", "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003cv1.9.0", "affected_versions": "All versions before v1.9.0", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-937" ], "date": "2023-06-09", "description": "Versions of the package github.com/gin-gonic/gin before 1.9.0 is vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.", "fixed_versions": [ "v1.9.0" ], "identifier": "CVE-2023-26125", "identifiers": [ "CVE-2023-26125", "GHSA-3vp4-m3rf-835h" ], "not_impacted": "All versions starting from v1.9.0", "package_slug": "go/github.com/gin-gonic/gin", "pubdate": "2023-05-04", "solution": "Upgrade to version 1.9.0 or above.", "title": "Improper input validation in github.com/gin-gonic/gin", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2023-26125", "https://github.com/gin-gonic/gin/pull/3500", "https://github.com/gin-gonic/gin/pull/3503", "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b", "https://github.com/gin-gonic/gin/releases/tag/v1.9.0", "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285", "https://github.com/advisories/GHSA-3vp4-m3rf-835h" ], "uuid": "b7f8b509-d375-4dd3-9dcb-5373f94660f8", "versions": [ { "commit": { "sha": "ea03e10384502e1baf6f560a2b0ea32c342ede5b", "tags": [ "v1.9.0" ], "timestamp": "20230221092032" }, "number": "v1.9.0" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gin-gonic:gin:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "report@snyk.io", "ID": "CVE-2023-26125" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b" }, { "name": "https://github.com/gin-gonic/gin/pull/3500", "refsource": "MISC", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/gin-gonic/gin/pull/3500" }, { "name": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285" }, { "name": "https://github.com/gin-gonic/gin/pull/3503", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/gin-gonic/gin/pull/3503" }, { "name": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0", "refsource": "MISC", "tags": [ "Release Notes" ], "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.0" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4 } }, "lastModifiedDate": "2023-06-09T18:32Z", "publishedDate": "2023-05-04T05:15Z" } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.