Action not permitted
Modal body text goes here.
CVE-2023-34104
Vulnerability from cvelistv5
Published
2023-06-06 17:35
Modified
2024-08-02 16:01
Severity ?
EPSS score ?
Summary
Regex Injection via Doctype Entities
References
Impacted products
▼ | Vendor | Product |
---|---|---|
NaturalIntelligence | fast-xml-parser |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "fast-xml-parser", "vendor": "NaturalIntelligence", "versions": [ { "status": "affected", "version": "\u003e= 4.1.3, \u003c 4.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T17:25:26.760Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b" } ], "source": { "advisory": "GHSA-6w63-h3fj-q4vw", "discovery": "UNKNOWN" }, "title": "Regex Injection via Doctype Entities" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34104", "datePublished": "2023-06-06T17:35:54.699Z", "dateReserved": "2023-05-25T21:56:51.246Z", "dateUpdated": "2024-08-02T16:01:54.110Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-34104\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-06-06T18:15:11.643\",\"lastModified\":\"2024-01-22T18:15:20.003\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"},{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"D11D7415-214B-458D-B675-CD7E0F3D8248\"}]}]}],\"references\":[{\"url\":\"https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
rhsa-2023_4627
Vulnerability from csaf_redhat
Published
2023-08-14 01:02
Modified
2024-11-15 17:26
Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 6.2.0 release
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 6.2.0 Images
Security Fix(es):
* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)
* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)
* x/net/http2/h2c: request smuggling (CVE-2022-41721)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)
* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)
* htmlUnit: Stack overflow crash causes Denial of Service (DoS) (CVE-2023-2798)
* zip4j: does not always check the MAC when decrypting a ZIP archive (CVE-2023-22899)
* golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results (CVE-2023-24532)
* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
* fast-xml-parser: Regex Injection via Doctype Entities (CVE-2023-34104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Migration Toolkit for Applications 6.2.0 release\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Applications 6.2.0 Images\n\nSecurity Fix(es):\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n\n* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* x/net/http2/h2c: request smuggling (CVE-2022-41721)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* htmlUnit: Stack overflow crash causes Denial of Service (DoS) (CVE-2023-2798)\n\n* zip4j: does not always check the MAC when decrypting a ZIP archive (CVE-2023-22899)\n\n* golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results (CVE-2023-24532)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* golang-github-gin-gonic-gin: Improper Input Validation (CVE-2023-26125)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\n* fast-xml-parser: Regex Injection via Doctype Entities (CVE-2023-34104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4627", "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2151988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988" }, { "category": "external", "summary": "2153260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260" }, { "category": "external", "summary": "2153379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379" }, { "category": "external", "summary": "2162182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162182" }, { "category": "external", "summary": "2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "external", "summary": "2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "2185278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185278" }, { "category": "external", "summary": "2185707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185707" }, { "category": "external", "summary": "2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "2210366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210366" }, { "category": "external", "summary": "2221261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221261" }, { "category": "external", "summary": "2223355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355" }, { "category": "external", "summary": "MTA-1015", "url": "https://issues.redhat.com/browse/MTA-1015" }, { "category": "external", "summary": "MTA-1041", "url": "https://issues.redhat.com/browse/MTA-1041" }, { "category": "external", "summary": "MTA-194", "url": "https://issues.redhat.com/browse/MTA-194" }, { "category": "external", "summary": "MTA-24", "url": "https://issues.redhat.com/browse/MTA-24" }, { "category": "external", "summary": "MTA-27", "url": "https://issues.redhat.com/browse/MTA-27" }, { "category": "external", "summary": "MTA-464", "url": "https://issues.redhat.com/browse/MTA-464" }, { "category": "external", "summary": "MTA-465", "url": "https://issues.redhat.com/browse/MTA-465" }, { "category": "external", "summary": "MTA-468", "url": "https://issues.redhat.com/browse/MTA-468" }, { "category": "external", "summary": "MTA-469", "url": "https://issues.redhat.com/browse/MTA-469" }, { "category": "external", "summary": "MTA-470", "url": "https://issues.redhat.com/browse/MTA-470" }, { "category": "external", "summary": "MTA-472", "url": "https://issues.redhat.com/browse/MTA-472" }, { "category": "external", "summary": "MTA-474", "url": "https://issues.redhat.com/browse/MTA-474" }, { "category": "external", "summary": "MTA-476", "url": "https://issues.redhat.com/browse/MTA-476" }, { "category": "external", "summary": "MTA-477", "url": "https://issues.redhat.com/browse/MTA-477" }, { "category": "external", "summary": "MTA-478", "url": "https://issues.redhat.com/browse/MTA-478" }, { "category": "external", "summary": "MTA-479", "url": "https://issues.redhat.com/browse/MTA-479" }, { "category": "external", "summary": "MTA-480", "url": "https://issues.redhat.com/browse/MTA-480" }, { "category": "external", "summary": "MTA-481", "url": "https://issues.redhat.com/browse/MTA-481" }, { "category": "external", "summary": "MTA-483", "url": "https://issues.redhat.com/browse/MTA-483" }, { "category": "external", "summary": "MTA-484", "url": "https://issues.redhat.com/browse/MTA-484" }, { "category": "external", "summary": "MTA-485", "url": "https://issues.redhat.com/browse/MTA-485" }, { "category": "external", "summary": "MTA-500", "url": "https://issues.redhat.com/browse/MTA-500" }, { "category": "external", "summary": "MTA-582", "url": "https://issues.redhat.com/browse/MTA-582" }, { "category": "external", "summary": "MTA-590", "url": "https://issues.redhat.com/browse/MTA-590" }, { "category": "external", "summary": "MTA-643", "url": "https://issues.redhat.com/browse/MTA-643" }, { "category": "external", "summary": "MTA-647", "url": "https://issues.redhat.com/browse/MTA-647" }, { "category": "external", "summary": "MTA-651", "url": "https://issues.redhat.com/browse/MTA-651" }, { "category": "external", "summary": "MTA-658", "url": "https://issues.redhat.com/browse/MTA-658" }, { "category": "external", "summary": "MTA-659", "url": "https://issues.redhat.com/browse/MTA-659" }, { "category": "external", "summary": "MTA-674", "url": "https://issues.redhat.com/browse/MTA-674" }, { "category": "external", "summary": "MTA-678", "url": "https://issues.redhat.com/browse/MTA-678" }, { "category": "external", "summary": "MTA-680", "url": "https://issues.redhat.com/browse/MTA-680" }, { "category": "external", "summary": "MTA-681", "url": "https://issues.redhat.com/browse/MTA-681" }, { "category": "external", "summary": "MTA-682", "url": "https://issues.redhat.com/browse/MTA-682" }, { "category": "external", "summary": "MTA-695", "url": "https://issues.redhat.com/browse/MTA-695" }, { "category": "external", "summary": "MTA-698", "url": "https://issues.redhat.com/browse/MTA-698" }, { "category": "external", "summary": "MTA-699", "url": "https://issues.redhat.com/browse/MTA-699" }, { "category": "external", "summary": "MTA-706", "url": "https://issues.redhat.com/browse/MTA-706" }, { "category": "external", "summary": "MTA-717", "url": "https://issues.redhat.com/browse/MTA-717" }, { "category": "external", "summary": "MTA-739", "url": "https://issues.redhat.com/browse/MTA-739" }, { "category": "external", "summary": "MTA-741", "url": "https://issues.redhat.com/browse/MTA-741" }, { "category": "external", "summary": "MTA-747", "url": "https://issues.redhat.com/browse/MTA-747" }, { "category": "external", "summary": "MTA-750", "url": "https://issues.redhat.com/browse/MTA-750" }, { "category": "external", "summary": "MTA-753", "url": "https://issues.redhat.com/browse/MTA-753" }, { "category": "external", "summary": "MTA-761", "url": "https://issues.redhat.com/browse/MTA-761" }, { "category": "external", "summary": "MTA-764", "url": "https://issues.redhat.com/browse/MTA-764" }, { "category": "external", "summary": "MTA-765", "url": "https://issues.redhat.com/browse/MTA-765" }, { "category": "external", "summary": "MTA-766", "url": "https://issues.redhat.com/browse/MTA-766" }, { "category": "external", "summary": "MTA-772", "url": "https://issues.redhat.com/browse/MTA-772" }, { "category": "external", "summary": "MTA-773", "url": "https://issues.redhat.com/browse/MTA-773" }, { "category": "external", "summary": "MTA-778", "url": "https://issues.redhat.com/browse/MTA-778" }, { "category": "external", "summary": "MTA-802", "url": "https://issues.redhat.com/browse/MTA-802" }, { "category": "external", "summary": "MTA-807", "url": "https://issues.redhat.com/browse/MTA-807" }, { "category": "external", "summary": "MTA-808", "url": "https://issues.redhat.com/browse/MTA-808" }, { "category": "external", "summary": "MTA-809", "url": "https://issues.redhat.com/browse/MTA-809" }, { "category": "external", "summary": "MTA-81", "url": "https://issues.redhat.com/browse/MTA-81" }, { "category": "external", "summary": "MTA-811", "url": "https://issues.redhat.com/browse/MTA-811" }, { "category": "external", "summary": "MTA-814", "url": "https://issues.redhat.com/browse/MTA-814" }, { "category": "external", "summary": "MTA-815", "url": "https://issues.redhat.com/browse/MTA-815" }, { "category": "external", "summary": "MTA-826", "url": "https://issues.redhat.com/browse/MTA-826" }, { "category": "external", "summary": "MTA-83", "url": "https://issues.redhat.com/browse/MTA-83" }, { "category": "external", "summary": "MTA-84", "url": "https://issues.redhat.com/browse/MTA-84" }, { "category": "external", "summary": "MTA-845", "url": "https://issues.redhat.com/browse/MTA-845" }, { "category": "external", "summary": "MTA-863", "url": "https://issues.redhat.com/browse/MTA-863" }, { "category": "external", "summary": "MTA-870", "url": "https://issues.redhat.com/browse/MTA-870" }, { "category": "external", "summary": "MTA-872", "url": "https://issues.redhat.com/browse/MTA-872" }, { "category": "external", "summary": "MTA-873", "url": "https://issues.redhat.com/browse/MTA-873" }, { "category": "external", "summary": "MTA-877", "url": "https://issues.redhat.com/browse/MTA-877" }, { "category": "external", "summary": "MTA-881", "url": "https://issues.redhat.com/browse/MTA-881" }, { "category": "external", "summary": "MTA-89", "url": "https://issues.redhat.com/browse/MTA-89" }, { "category": "external", "summary": "MTA-894", "url": "https://issues.redhat.com/browse/MTA-894" }, { "category": "external", "summary": "MTA-895", "url": "https://issues.redhat.com/browse/MTA-895" }, { "category": "external", "summary": "MTA-898", "url": "https://issues.redhat.com/browse/MTA-898" }, { "category": "external", "summary": "MTA-906", "url": "https://issues.redhat.com/browse/MTA-906" }, { "category": "external", "summary": "MTA-908", "url": "https://issues.redhat.com/browse/MTA-908" }, { "category": "external", "summary": "MTA-909", "url": "https://issues.redhat.com/browse/MTA-909" }, { "category": "external", "summary": "MTA-91", "url": "https://issues.redhat.com/browse/MTA-91" }, { "category": "external", "summary": "MTA-912", "url": "https://issues.redhat.com/browse/MTA-912" }, { "category": "external", "summary": "MTA-916", "url": "https://issues.redhat.com/browse/MTA-916" }, { "category": "external", "summary": "MTA-923", "url": "https://issues.redhat.com/browse/MTA-923" }, { "category": "external", "summary": "MTA-93", "url": "https://issues.redhat.com/browse/MTA-93" }, { "category": "external", "summary": "MTA-937", "url": "https://issues.redhat.com/browse/MTA-937" }, { "category": "external", "summary": "MTA-943", "url": "https://issues.redhat.com/browse/MTA-943" }, { "category": "external", "summary": "MTA-973", "url": "https://issues.redhat.com/browse/MTA-973" }, { "category": "external", "summary": "MTA-974", "url": "https://issues.redhat.com/browse/MTA-974" }, { "category": "external", "summary": "MTA-984", "url": "https://issues.redhat.com/browse/MTA-984" }, { "category": "external", "summary": "MTA-985", "url": "https://issues.redhat.com/browse/MTA-985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4627.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update", "tracking": { "current_release_date": "2024-11-15T17:26:22+00:00", "generator": { "date": "2024-11-15T17:26:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:4627", "initial_release_date": "2023-08-14T01:02:25+00:00", "revision_history": [ { "date": "2023-08-14T01:02:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-08-14T01:02:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:26:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el9" } } }, { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Applications" }, { "branches": [ { "category": "product_version", "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product": { "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product_id": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=6.2.0-16" } } }, { "category": "product_version", "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product": { "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product_id": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=6.2.0-29" } } }, { "category": "product_version", "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product": { "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product_id": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=6.2.0-12" } } }, { "category": "product_version", "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product": { "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product_id": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-pathfinder-rhel9\u0026tag=6.2.0-5" } } }, { "category": "product_version", "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product": { "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product_id": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=6.2.0-17" } } }, { "category": "product_version", "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product": { "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product_id": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-addon-rhel9\u0026tag=6.2.0-11" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64" }, "product_reference": "mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "relates_to_product_reference": "8Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" }, "product_reference": "mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" }, "product_reference": "mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64" }, "product_reference": "mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" }, "product_reference": "mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" }, "product_reference": "mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64", "relates_to_product_reference": "9Base-MTA-6.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-46877", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185707" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46877" }, { "category": "external", "summary": "RHBZ#2185707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46877", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46877" } ], "release_date": "2023-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode" }, { "cve": "CVE-2022-4492", "cwe": { "id": "CWE-550", "name": "Server-generated Error Message Containing Sensitive Information" }, "discovery_date": "2022-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153260" } ], "notes": [ { "category": "description", "text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Server identity in https connection is not checked by the undertow client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4492" }, { "category": "external", "summary": "RHBZ#2153260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: Server identity in https connection is not checked by the undertow client" }, { "cve": "CVE-2022-41721", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2023-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2162182" } ], "notes": [ { "category": "description", "text": "A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "x/net/http2/h2c: request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41721" }, { "category": "external", "summary": "RHBZ#2162182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41721" }, { "category": "external", "summary": "https://go.dev/cl/447396", "url": "https://go.dev/cl/447396" }, { "category": "external", "summary": "https://go.dev/issue/56352", "url": "https://go.dev/issue/56352" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1495", "url": "https://pkg.go.dev/vuln/GO-2023-1495" } ], "release_date": "2023-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "x/net/http2/h2c: request smuggling" }, { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "cve": "CVE-2022-41724", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178492" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: large handshake records may cause panics", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a denial of service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41724" }, { "category": "external", "summary": "RHBZ#2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724" }, { "category": "external", "summary": "https://go.dev/cl/468125", "url": "https://go.dev/cl/468125" }, { "category": "external", "summary": "https://go.dev/issue/58001", "url": "https://go.dev/issue/58001" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1570", "url": "https://pkg.go.dev/vuln/GO-2023-1570" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: large handshake records may cause panics" }, { "cve": "CVE-2022-41725", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178488" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41725" }, { "category": "external", "summary": "RHBZ#2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725" }, { "category": "external", "summary": "https://go.dev/cl/468124", "url": "https://go.dev/cl/468124" }, { "category": "external", "summary": "https://go.dev/issue/58006", "url": "https://go.dev/issue/58006" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1569", "url": "https://pkg.go.dev/vuln/GO-2023-1569" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2022-41854", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151988" } ], "notes": [ { "category": "description", "text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "dev-java/snakeyaml: DoS via stack overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41854" }, { "category": "external", "summary": "RHBZ#2151988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41854" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355" }, { "category": "external", "summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355", "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355" } ], "release_date": "2022-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dev-java/snakeyaml: DoS via stack overflow" }, { "cve": "CVE-2022-41881", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2022-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153379" } ], "notes": [ { "category": "description", "text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41881" }, { "category": "external", "summary": "RHBZ#2153379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881" } ], "release_date": "2022-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS" }, { "cve": "CVE-2023-2798", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-05-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2210366" } ], "notes": [ { "category": "description", "text": "A flaw was found in HtmlUnit. This issue may allow a malicious user to supply content to htmlUnit, which could cause a crash by stack overflow, leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "htmlUnit: Stack overflow crash causes Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-2798" }, { "category": "external", "summary": "RHBZ#2210366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2798", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2798" } ], "release_date": "2023-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "htmlUnit: Stack overflow crash causes Denial of Service (DoS)" }, { "cve": "CVE-2023-22899", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2023-01-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185278" } ], "notes": [ { "category": "description", "text": "A flaw was found in Zip4j. In this issue, it does not always check the MAC when decrypting a ZIP archive.", "title": "Vulnerability description" }, { "category": "summary", "text": "zip4j: does not always check the MAC when decrypting a ZIP archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-22899" }, { "category": "external", "summary": "RHBZ#2185278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22899", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22899" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22899", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22899" } ], "release_date": "2023-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "zip4j: does not always check the MAC when decrypting a ZIP archive" }, { "cve": "CVE-2023-24532", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2023-07-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24532" }, { "category": "external", "summary": "RHBZ#2223355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532" }, { "category": "external", "summary": "https://go.dev/cl/471255", "url": "https://go.dev/cl/471255" }, { "category": "external", "summary": "https://go.dev/issue/58647", "url": "https://go.dev/issue/58647" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY", "url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1621", "url": "https://pkg.go.dev/vuln/GO-2023-1621" } ], "release_date": "2023-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results" }, { "cve": "CVE-2023-24534", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184483" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto: denial of service from excessive memory allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24534" }, { "category": "external", "summary": "RHBZ#2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534" }, { "category": "external", "summary": "https://go.dev/issue/58975", "url": "https://go.dev/issue/58975" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto: denial of service from excessive memory allocation" }, { "cve": "CVE-2023-24536", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184482" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses Go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not-affected.\n* The CVE refers to multipart form parsing routine mime/multipart.Reader.ReadForm, which is not used in Grafana, hence it is not-affected.\n* Butane does not parse multipart forms, hence, it is also not-affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24536" }, { "category": "external", "summary": "RHBZ#2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536" }, { "category": "external", "summary": "https://go.dev/issue/59153", "url": "https://go.dev/issue/59153" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2023-24537", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184484" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: Infinite loop in parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24537" }, { "category": "external", "summary": "RHBZ#2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59180", "url": "https://github.com/golang/go/issues/59180" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: Infinite loop in parsing" }, { "cve": "CVE-2023-24538", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184481" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: backticks not treated as string delimiters", "title": "Vulnerability summary" }, { "category": "other", "text": "The described issue involving Go templates and JavaScript template literals poses a moderate severity rather than an important one due to several mitigating factors. Firstly, the vulnerability requires specific conditions to be met: the presence of Go templates within JavaScript template literals. This limits the scope of affected codebases, reducing the likelihood of exploitation. Additionally, the decision to disallow such interactions in future releases of Go indicates a proactive approach to addressing the issue. Furthermore, the affected packages or components within Red Hat Enterprise Linux, such as Conmon, Grafana, and the RHC package, have been assessed and determined not to be impacted due to their specific usage patterns. So the limited scope of affected systems and the absence of exploitation vectors in specific components within Red Hat Enterprise Linux contribute to categorizing the severity of the issue as moderate.\n\nFor Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* The rhc package do not make use of html/template. Hence, it is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24538" }, { "category": "external", "summary": "RHBZ#2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59234", "url": "https://github.com/golang/go/issues/59234" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: backticks not treated as string delimiters" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24539", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196026" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper sanitization of CSS values", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24539" }, { "category": "external", "summary": "RHBZ#2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59720", "url": "https://github.com/golang/go/issues/59720" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper sanitization of CSS values" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24540", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196027" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of JavaScript whitespace", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24540" }, { "category": "external", "summary": "RHBZ#2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540" }, { "category": "external", "summary": "https://go.dev/issue/59721", "url": "https://go.dev/issue/59721" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: html/template: improper handling of JavaScript whitespace" }, { "cve": "CVE-2023-26125", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2203769" } ], "notes": [ { "category": "description", "text": "A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gin-gonic-gin: Improper Input Validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26125" }, { "category": "external", "summary": "RHBZ#2203769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26125", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26125" }, { "category": "external", "summary": "https://www.postgresql.org/support/security/CVE-2023-2454/", "url": "https://www.postgresql.org/support/security/CVE-2023-2454/" } ], "release_date": "2023-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gin-gonic-gin: Improper Input Validation" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-29400", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196029" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of empty HTML attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29400" }, { "category": "external", "summary": "RHBZ#2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400" }, { "category": "external", "summary": "https://go.dev/issue/59722", "url": "https://go.dev/issue/59722" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper handling of empty HTML attributes" }, { "cve": "CVE-2023-34104", "cwe": { "id": "CWE-917", "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)" }, "discovery_date": "2023-06-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2221261" } ], "notes": [ { "category": "description", "text": "A flaw was found in the fast-XML-parser. The affected versions of fast-XML-parser are vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the Doctype Entities. By sending a specially crafted regex input, a remote attacker can cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "fast-xml-parser: Regex Injection via Doctype Entities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:c33386019c431eaeac3559226353b5a50cd54c03a2975bde02f6a66427fca893_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:5cc1613cb869bab75faa5ea2798ab5f34238192b397d3c942789b4242a8a815a_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:3165133f54da89d0e2b897a8069db7d17a4d956b712f84eb320c083506c24469_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:8cbce6bd4bc17d78e532477bbb4d8c6d02a5f0d0a823b6a9f20c072ff66fdb26_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:5a6e25695fbf883d6c02cd8b933a2a482e3e18ec70e86be0db576a107ff65a84_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-34104" }, { "category": "external", "summary": "RHBZ#2221261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-34104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34104" }, { "category": "external", "summary": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "category": "external", "summary": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" } ], "release_date": "2023-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-08-14T01:02:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4627" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:d393b1ae0968bd8710a8e58c0e74d293c58b804fb5e6cbb9434520c888a80587_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fast-xml-parser: Regex Injection via Doctype Entities" } ] }
ghsa-6w63-h3fj-q4vw
Vulnerability from github
Published
2023-06-06 17:33
Modified
2024-01-25 21:05
Severity ?
Summary
fast-xml-parser vulnerable to Regex Injection via Doctype Entities
Details
Impact
"fast-xml-parser" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time.
Patches
The problem has been resolved in v4.2.4
Workarounds
Avoid using DOCTYPE parsing by processEntities: false
option.
{ "affected": [ { "ecosystem_specific": { "affected_functions": [ "(fast-xml-parser).XMLParser" ] }, "package": { "ecosystem": "npm", "name": "fast-xml-parser" }, "ranges": [ { "events": [ { "introduced": "4.1.3" }, { "fixed": "4.2.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-34104" ], "database_specific": { "cwe_ids": [ "CWE-1333" ], "github_reviewed": true, "github_reviewed_at": "2023-06-06T17:33:13Z", "nvd_published_at": "2023-06-06T18:15:11Z", "severity": "HIGH" }, "details": "### Impact\n\"fast-xml-parser\" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time.\n\n### Patches\nThe problem has been resolved in v4.2.4\n\n### Workarounds\nAvoid using DOCTYPE parsing by `processEntities: false` option.\n", "id": "GHSA-6w63-h3fj-q4vw", "modified": "2024-01-25T21:05:07Z", "published": "2023-06-06T17:33:13Z", "references": [ { "type": "WEB", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34104" }, { "type": "WEB", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "type": "WEB", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b" }, { "type": "PACKAGE", "url": "https://github.com/NaturalIntelligence/fast-xml-parser" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "fast-xml-parser vulnerable to Regex Injection via Doctype Entities" }
gsd-2023-34104
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-34104", "id": "GSD-2023-34104" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-34104" ], "details": "fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.", "id": "GSD-2023-34104", "modified": "2023-12-13T01:20:30.728574Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-34104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "fast-xml-parser", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003e= 4.1.3, \u003c 4.2.4" } ] } } ] }, "vendor_name": "NaturalIntelligence" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-400", "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] }, { "description": [ { "cweId": "CWE-1333", "lang": "eng", "value": "CWE-1333: Inefficient Regular Expression Complexity" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "refsource": "MISC", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c", "refsource": "MISC", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "name": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b", "refsource": "MISC", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b" } ] }, "source": { "advisory": "GHSA-6w63-h3fj-q4vw", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c4.2.4", "affected_versions": "All versions before 4.2.4", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-1333", "CWE-937" ], "date": "2023-06-13", "description": "fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.", "fixed_versions": [ "4.2.4" ], "identifier": "CVE-2023-34104", "identifiers": [ "CVE-2023-34104", "GHSA-6w63-h3fj-q4vw" ], "not_impacted": "All versions starting from 4.2.4", "package_slug": "npm/fast-xml-parser", "pubdate": "2023-06-06", "solution": "Upgrade to version 4.2.4 or above.", "title": "Inefficient Regular Expression Complexity", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2023-34104", "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw", "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" ], "uuid": "b4ee15ab-9651-4347-ac22-ac1d3d6294b3" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "D11D7415-214B-458D-B675-CD7E0F3D8248", "versionEndExcluding": "4.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option." } ], "id": "CVE-2023-34104", "lastModified": "2024-01-22T18:15:20.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2023-06-06T18:15:11.643", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c" }, { "source": "security-advisories@github.com", "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1333" }, { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.