Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-39307
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T12:00:44.036Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "grafana", vendor: "grafana", versions: [ { status: "affected", version: ">= v9.0.0-beta1, < 9.2.4", }, { status: "affected", version: "< 8.5.15", }, ], }, ], descriptions: [ { lang: "en", value: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-15T00:00:00", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, ], source: { advisory: "GHSA-3p62-42x7-gxg5", discovery: "UNKNOWN", }, title: "Grafana subject to Exposure of Sensitive Information resulting in User enumeration via forget password", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-39307", datePublished: "2022-11-09T00:00:00", dateReserved: "2022-09-02T00:00:00", dateUpdated: "2024-08-03T12:00:44.036Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.5.15\", \"matchCriteriaId\": \"E14BE3CF-706D-46EF-BC46-176252F61AA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.0.0\", \"versionEndExcluding\": \"9.2.4\", \"matchCriteriaId\": \"3E1FE6F4-C2C8-432B-91AF-01A4D4036956\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \\u201cuser not found\\u201d message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.\"}, {\"lang\": \"es\", \"value\": \"Grafana es una plataforma de c\\u00f3digo abierto para monitorizaci\\u00f3n y observabilidad. Cuando se utiliza la opci\\u00f3n de olvidar contrase\\u00f1a en la p\\u00e1gina de inicio de sesi\\u00f3n, se realiza una solicitud POST a la URL `/api/user/password/sent-reset-email`. Cuando el nombre de usuario o el correo electr\\u00f3nico no existe, una respuesta JSON contiene un mensaje \\\"usuario no encontrado\\\". Esto filtra informaci\\u00f3n a usuarios no autenticados e introduce un riesgo de seguridad. Este problema se solucion\\u00f3 en 9.2.4 y se actualiz\\u00f3 a 8.5.15. No se conocen workarounds.\"}]", id: "CVE-2022-39307", lastModified: "2024-11-21T07:18:00.080", metrics: "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}", published: "2022-11-09T23:15:12.617", references: "[{\"url\": \"https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20221215-0004/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20221215-0004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-209\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2022-39307\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-11-09T23:15:12.617\",\"lastModified\":\"2024-11-21T07:18:00.080\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.\"},{\"lang\":\"es\",\"value\":\"Grafana es una plataforma de código abierto para monitorización y observabilidad. Cuando se utiliza la opción de olvidar contraseña en la página de inicio de sesión, se realiza una solicitud POST a la URL `/api/user/password/sent-reset-email`. Cuando el nombre de usuario o el correo electrónico no existe, una respuesta JSON contiene un mensaje \\\"usuario no encontrado\\\". Esto filtra información a usuarios no autenticados e introduce un riesgo de seguridad. Este problema se solucionó en 9.2.4 y se actualizó a 8.5.15. No se conocen workarounds.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.2,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-209\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.5.15\",\"matchCriteriaId\":\"E14BE3CF-706D-46EF-BC46-176252F61AA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.2.4\",\"matchCriteriaId\":\"3E1FE6F4-C2C8-432B-91AF-01A4D4036956\"}]}]}],\"references\":[{\"url\":\"https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221215-0004/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221215-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2024:0191-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security Beta update for SUSE Manager Client Tools", title: "Title of the patch", }, { category: "description", text: "This update fixes the following issues:\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go >= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL >= 8\n- Build with Go >= 1.20 when the OS is not RHEL\n- Fix apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build using promu\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n- Upgrade to version 0.13.3\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n - Adjust dependencies on spec file \n - Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-alertmanager:\n\n- Do not create PIE for s390x architecture\n- Require Go 1.20 or newer for building\n- Remove not used build flags\n- Create position independent executables (PIE)\n- Disable striping the binaries only for SLE 15 SP3\n- Add System/Monitoring group tag\n- Rework service file to use obscpio\n * Run tar and recompress services at buildtime\n * Do not generate automatically changelog entries\n- Update to version 0.26.0 (jsc#PED-7353):\n https://github.com/prometheus/alertmanager/releases/tag/v0.26.0\n * CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838)\n * Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash\n * Templating: Fixed a race condition when using the title\n function. It is now race-safe\n * API: Fixed duplicate receiver names in the api/v2/receivers API\n endpoint\n * API: Attempting to delete a silence now returns the correct\n status code, 404 instead of 500\n * Clustering: Fixes a panic when tls_client_config is empty\n * Webhook: url is now marked as a secret. It will no longer show\n up in the logs as clear-text\n * Metrics: New label reason for\n alertmanager_notifications_failed_total metric to indicate the\n type of error of the alert delivery\n * Clustering: New flag --cluster.label, to help to block any\n traffic that is not meant for the cluster\n * Integrations: Add Microsoft Teams as a supported integration\n- Update to version 0.25.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.25.0\n * Fail configuration loading if api_key and api_key_file are\n defined at the same time\n * Fix the alertmanager_alerts metric to avoid counting resolved\n alerts as active. Also added a new alertmanager_marked_alerts\n metric that retain the old behavior\n * Trim contents of Slack API URLs when reading from files\n * amtool: Avoid panic when the label value matcher is empty\n * Fail configuration loading if api_url is empty for OpsGenie\n * Fix email template for resolved notifications\n * Add proxy_url support for OAuth2 in HTTP client configuration\n * Reload TLS certificate and key from disk when updated\n * Add Discord integration\n * Add Webex integration\n * Add min_version support to select the minimum TLS version in\n HTTP client configuration\n * Add max_version support to select the maximum TLS version in\n * Emit warning logs when truncating messages in notifications\n * Support HEAD method for the /-/healty and /-/ready endpoints\n * Add support for reading global and local SMTP passwords from\n files\n * UI: Add 'Link' button to alerts in list\n * UI: Allow to choose the first day of the week as Sunday or\n Monday\n- Update to version 0.24.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.24.0\n * Fix HTTP client configuration for the SNS receiver\n * Fix unclosed file descriptor after reading the silences\n snapshot file\n * Fix field names for mute_time_intervals in JSON marshaling\n * Ensure that the root route doesn't have any matchers\n * Truncate the message's title to 1024 chars to avoid hitting\n Slack limits\n * Fix the default HTML email template (email.default.html) to\n match with the canonical source\n * Detect SNS FIFO topic based on the rendered value\n * Avoid deleting and recreating a silence when an update is\n possible\n * api/v2: Return 200 OK when deleting an expired silence\n * amtool: Fix the silence's end date when adding a silence. The\n end date is (start date + duration) while it used to be\n (current time + duration). The new behavior is consistent with\n the update operation\n * Add the /api/v2 prefix to all endpoints in the OpenAPI\n specification and generated client code\n * Add --cluster.tls-config experimental flag to secure cluster\n traffic via mutual TLS\n * Add Telegram integration\n- CVE-2022-46146: Prevent authentication bypass via cache poisoning (bsc#1208051)\n- Do not include sources (bsc#1200725)\n\ngolang-github-prometheus-node_exporter:\n\n- Remove node_exporter-1.5.0.tar.gz\n- Execute tar and recompress service modules at buildtime\n- Update to 1.5.0 (jsc#PED-3578):\n * NOTE: This changes the Go runtime 'GOMAXPROCS' to 1. This is done to limit the\n concurrency of the exporter to 1 CPU thread at a time in order to avoid a\n race condition problem in the Linux kernel (#2500) and parallel IO issues\n on nodes with high numbers of CPUs/CPU threads (#1880).\n * [CHANGE] Default GOMAXPROCS to 1 #2530\n * [FEATURE] Add multiple listeners and systemd socket listener activation #2393\n * [ENHANCEMENT] Add RTNL version of netclass collector #2492, #2528\n * [BUGFIX] Fix hwmon label sanitizer #2504\n * [BUGFIX] Use native endianness when encoding InetDiagMsg #2508\n * [BUGFIX] Fix btrfs device stats always being zero #2516\n- Update to 1.4.1:\n * [BUGFIX] Fix diskstats exclude flags #2487\n * [SECURITY] CVE-2022-27191, CVE-2022-27664: Update go/x/crypto and go/x/net (bsc#1197284, bsc#1203185)\n * [SECURITY] CVE-2022-46146: Update exporter-toolkit (bsc#1208064)\n- Update to 1.4.0:\n * [CHANGE] Merge metrics descriptions in textfile collector #2475\n * [FEATURE] [node-mixin] Add darwin dashboard to mixin #2351\n * [FEATURE] Add 'isolated' metric on cpu collector on linux #2251\n * [FEATURE] Add cgroup summary collector #2408\n * [FEATURE] Add selinux collector #2205\n * [FEATURE] Add slab info collector #2376\n * [FEATURE] Add sysctl collector #2425\n * [FEATURE] Also track the CPU Spin time for OpenBSD systems #1971\n * [FEATURE] Add support for MacOS version #2471\n * [ENHANCEMENT] [node-mixin] Add missing selectors #2426\n * [ENHANCEMENT] [node-mixin] Change current datasource to grafana's default #2281\n * [ENHANCEMENT] [node-mixin] Change disk graph to disk table #2364\n * [ENHANCEMENT] [node-mixin] Change io time units to %util #2375\n * [ENHANCEMENT] Ad user_wired_bytes and laundry_bytes on *bsd #2266\n * [ENHANCEMENT] Add additional vm_stat memory metrics for darwin #2240\n * [ENHANCEMENT] Add device filter flags to arp collector #2254\n * [ENHANCEMENT] Add diskstats include and exclude device flags #2417\n * [ENHANCEMENT] Add node_softirqs_total metric #2221\n * [ENHANCEMENT] Add rapl zone name label option #2401\n * [ENHANCEMENT] Add slabinfo collector #1799\n * [ENHANCEMENT] Allow user to select port on NTP server to query #2270\n * [ENHANCEMENT] collector/diskstats: Add labels and metrics from udev #2404\n * [ENHANCEMENT] Enable builds against older macOS SDK #2327\n * [ENHANCEMENT] qdisk-linux: Add exclude and include flags for interface name #2432\n * [ENHANCEMENT] systemd: Expose systemd minor version #2282\n * [ENHANCEMENT] Use netlink for tcpstat collector #2322\n * [ENHANCEMENT] Use netlink to get netdev stats #2074\n * [ENHANCEMENT] Add additional perf counters for stalled frontend/backend cycles #2191\n * [ENHANCEMENT] Add btrfs device error stats #2193\n * [BUGFIX] [node-mixin] Fix fsSpaceAvailableCriticalThreshold and fsSpaceAvailableWarning #2352\n * [BUGFIX] Fix concurrency issue in ethtool collector #2289\n * [BUGFIX] Fix concurrency issue in netdev collector #2267\n * [BUGFIX] Fix diskstat reads and write metrics for disks with different sector sizes #2311\n * [BUGFIX] Fix iostat on macos broken by deprecation warning #2292\n * [BUGFIX] Fix NodeFileDescriptorLimit alerts #2340\n * [BUGFIX] Sanitize rapl zone names #2299\n * [BUGFIX] Add file descriptor close safely in test #2447\n * [BUGFIX] Fix race condition in os_release.go #2454\n * [BUGFIX] Skip ZFS IO metrics if their paths are missing #2451\n- BuildRequire go1.18 OR HIGHER (previously this was fixed to 1.14)\n- Update to 1.3.1\n * [BUGFIX] Handle nil CPU thermal power status on M1 #2218\n * [BUGFIX] bsd: Ignore filesystems flagged as MNT_IGNORE. #2227\n * [BUGFIX] Sanitize UTF-8 in dmi collector #2229\n- Exclude s390 arch.\n- Update spec file in order to make --version work (bsc#1196652)\n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape 'float histograms' or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add 'keep_firing_for' field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target's scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type='exemplar' label instead of type='unknown' for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during 'make clean'\n- Remove web-ui archives during 'make clean'.\n- Require promu >= 0.14.0 for building\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)\n- Upgrade to version 2.37.3\n * [BUGFIX] CVE-2022-41715: Update our regexp library to fix upstream vulnerability (bnc#1204023)\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n- Upgrade to version 2.37.2\n * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus\n startup.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don't increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- CVE-2022-46146: Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (bsc#1208049)\n- CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (bsc#1208298)\n\ngolang-github-prometheus-promu:\n\n- Always set user and host build metadata to constant string to\n achieve reproducible builds (compare reproducible-builds.org)\n- Add 0001-do_not_discover_user_host_for_reproducible_builds.patch\n- Require Go >= 1.19 for building\n- Require Go >= 1.18 for building Red Hat packages\n- Update to version 0.14.0 (jsc#PED-3576):\n * Add the ability to override tags per GOOS\n * Remove ioutil\n * Update common Prometheus files (#232) (#224)\n * Validate environment variable value\n * Set build date from SOURCE_DATE_EPOCH\n- Update to Go 1.18\n- Exclude s390 architecture.\n- Set build date from last changelog modification (bsc#1047218)\n- Adapted for Enterprise Linux build.\n- Build requires Go 1.15\n * Make extldflags extensible by configuration. #125\n * Avoid bind-mounting to allow building with a remote docker engine #95\n- Update to 0.2.0\n + Features:\n * Adding changes to support s390x\n * Add option to disable static linking\n * Add support for 32bit MIPS.\n * Added check_licenses Command to Promu\n + Enhancements:\n * Allow to customize nested options via env variables\n * Bump Go version to 1.11\n * Add warning if promu info is unable to determine repo info\n + Bug Fixes:\n * Fix build on SmartOS by not setting gcc's -static flag\n * Fix git repository url parsing\n- Update to 0.1.0\n- Initial version\n\ngrafana:\n\n- Update to version 9.5.8:\n * Please, check the release notes for further details.\n * Security fixes provided in this and previous versions:\n * CVE-2023-3128: Authentication bypass using Azure AD OAuth (bsc#1212641, jsc#PED-3694)\n * CVE-2023-2801: Prevent crash while executing concurrent mixed queries (bsc#1212099)\n * CVE-2023-2183: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100)\n * CVE-2023-1387: JWT URL-login flow leaks token to data sources through request parameter in proxy \n requests (bsc#1210907, jsc#PED-3694)\n * CVE-2023-1410: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n * CVE-2020-7753: Regular Expression Denial of Service (ReDoS) in trim function (bsc#1218843)\n * CVE-2021-3807: Regular expressionDdenial of Service (ReDoS) matching ANSI escape codes (bsc#1192154)\n * CVE-2021-3918: Improperly Controlled Modification of Object Prototype Attributes (bsc#1192696)\n * CVE-2021-43138: A malicious user can obtain privileges via the mapValues() method (bsc#1200480)\n * CVE-2022-0155: Exposure of Private Personal Information to an Unauthorized Actor (bsc#1218844)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2023-1410: Fix XSS in Graphite functions tooltip (bsc#1209645)\n * CVE-2023-0507: Apply attribute sanitation to GeomapPanel (bsc#1208821)\n * CVE-2023-0594: Avoid storing XSS in TraceView panel (bsc#1208819)\n * CVE-2022-46146: Fix basic authentication bypass by updating the exporter toolkit to \n version 0.7.3 (bsc#1208065)\n * CVE-2022-41723: Require Go 1.19 or newer (bsc#1208293)\n * CVE-2022-23552: SVG: Add dompurify preprocessor step (bsc#1207749)\n * CVE-2022-39324: Snapshots: Fix originalUrl spoof security issue (bsc#1207750)\n * CVE-2022-39306: Fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not\n exists (bsc#1205227)\n * CVE-2022-39201: Fix do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocknig other users from signing in (bsc#1204304)\n * CVE-2022-36062: RBAC folders/dashboards privilege escalation (bsc#1203596, jsc#PED-2145)\n * CVE-2022-35957: Escalation from admin to server admin when auth proxy is used (bsc#1203597, jsc#PED-2145)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2022-29170: Request security bypass via malicious redirect (bsc#1199810)\n * CVE-2022-31097: XSS vulnerability in the Unified Alerting (bsc#1201535)\n * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)\n * CVE-2022-21702: XSS vulnerability in handling data sources (bsc#1195726, jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)\n * CVE-2022-21703: Cross-origin request forgery vulnerability (bsc#1195727)\n * CVE-2022-21713: Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728)\n * CVE-2022-21673: GetUserInfo: return an error if no user was found (bsc#1194873)\n * CVE-2021-43813: Directory traversal vulnerability for .md files (bsc#1193688)\n * CVE-2021-43815: Directory traversal for .csv files (bsc#1193686)\n * CVE-2021-43798: arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-43798: Arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-41244: Grafana 8.2.4 released with security fixes (bsc#1192763)\n * Security: Fixes CVE-2021-41174, bsc#1192383.\n * Security: Update dependencies to fix CVE-2021-36222, bsc#1188571.\n\nkiwi-desc-saltboot:\n\n- Update to version 0.1.1687520761.cefb248\n * Add osimage cert package to bootstrap for\n SUSE Linux Enterprise 12 images (bsc#1204089)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Use salt bundle\n * Add support fo VirtIO disks\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go >= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with >= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL >= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go >= 1.18 on RHEL\n- Build with Go >= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Add 0001-Update-prometheus-exporter-toolkit-to-0.7.3.patch\n * Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208060)\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don't get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand 'ssm' keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of 'Containerized Proxy configuration' 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove 'Undefined return code' from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n * Update translation strings\n- Version 4.3.12-1\n * Update translation strings\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n * Update translation strings\n- Version 4.4.3-1\n * Update translation strings\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Update translation strings\n- Version 4.3.11-1\n * Update translation strings\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about 'rpm.hdr' object has no attribute 'get'\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-191,SUSE-SLE-Manager-Tools-12-BETA-2024-191", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0191-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0191-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240191-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0191-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html", }, { category: "self", summary: "SUSE Bug 1047218", url: "https://bugzilla.suse.com/1047218", }, { category: "self", summary: "SUSE Bug 1172110", url: "https://bugzilla.suse.com/1172110", }, { category: "self", summary: "SUSE Bug 1188571", url: "https://bugzilla.suse.com/1188571", }, { category: "self", summary: "SUSE Bug 1189520", url: "https://bugzilla.suse.com/1189520", }, { category: "self", summary: "SUSE Bug 1191454", url: "https://bugzilla.suse.com/1191454", }, { category: "self", summary: "SUSE Bug 1192154", url: "https://bugzilla.suse.com/1192154", }, { category: "self", summary: "SUSE Bug 1192383", url: "https://bugzilla.suse.com/1192383", }, { category: "self", summary: "SUSE Bug 1192696", url: "https://bugzilla.suse.com/1192696", }, { category: "self", summary: "SUSE Bug 1192763", url: "https://bugzilla.suse.com/1192763", }, { category: "self", summary: "SUSE Bug 1193492", url: "https://bugzilla.suse.com/1193492", }, { category: "self", summary: "SUSE Bug 1193686", url: "https://bugzilla.suse.com/1193686", }, { category: "self", summary: "SUSE Bug 1193688", url: "https://bugzilla.suse.com/1193688", }, { category: "self", summary: "SUSE Bug 1194873", url: "https://bugzilla.suse.com/1194873", }, { category: "self", summary: "SUSE Bug 1195726", url: "https://bugzilla.suse.com/1195726", }, { category: "self", summary: "SUSE Bug 1195727", url: "https://bugzilla.suse.com/1195727", }, { category: "self", summary: "SUSE Bug 1195728", url: "https://bugzilla.suse.com/1195728", }, { category: "self", summary: "SUSE Bug 1196338", url: "https://bugzilla.suse.com/1196338", }, { category: "self", summary: "SUSE Bug 1196652", url: "https://bugzilla.suse.com/1196652", }, { category: "self", summary: "SUSE Bug 1197507", url: "https://bugzilla.suse.com/1197507", }, { category: "self", summary: "SUSE Bug 1198903", url: "https://bugzilla.suse.com/1198903", }, { category: "self", summary: "SUSE Bug 1199810", url: "https://bugzilla.suse.com/1199810", }, { category: "self", summary: "SUSE Bug 1200480", url: "https://bugzilla.suse.com/1200480", }, { category: "self", summary: "SUSE Bug 1200591", url: "https://bugzilla.suse.com/1200591", }, { category: "self", summary: "SUSE Bug 1200725", url: "https://bugzilla.suse.com/1200725", }, { category: "self", summary: "SUSE Bug 1201003", url: "https://bugzilla.suse.com/1201003", }, { category: "self", summary: "SUSE Bug 1201059", url: "https://bugzilla.suse.com/1201059", }, { category: "self", summary: "SUSE Bug 1201535", url: "https://bugzilla.suse.com/1201535", }, { category: "self", summary: "SUSE Bug 1201539", url: "https://bugzilla.suse.com/1201539", }, { category: "self", summary: "SUSE Bug 1203283", url: "https://bugzilla.suse.com/1203283", }, { category: "self", summary: "SUSE Bug 1203596", url: "https://bugzilla.suse.com/1203596", }, { category: "self", summary: "SUSE Bug 1203597", url: "https://bugzilla.suse.com/1203597", }, { category: "self", summary: "SUSE Bug 1203599", url: "https://bugzilla.suse.com/1203599", }, { category: "self", summary: "SUSE Bug 1204032", url: "https://bugzilla.suse.com/1204032", }, { category: "self", summary: "SUSE Bug 1204089", url: "https://bugzilla.suse.com/1204089", }, { category: "self", summary: "SUSE Bug 1204126", url: "https://bugzilla.suse.com/1204126", }, { category: "self", summary: "SUSE Bug 1204302", url: "https://bugzilla.suse.com/1204302", }, { category: "self", summary: "SUSE Bug 1204303", url: "https://bugzilla.suse.com/1204303", }, { category: "self", summary: "SUSE Bug 1204304", url: "https://bugzilla.suse.com/1204304", }, { category: "self", summary: "SUSE Bug 1204305", url: "https://bugzilla.suse.com/1204305", }, { category: "self", summary: "SUSE Bug 1204501", url: "https://bugzilla.suse.com/1204501", }, { category: "self", summary: "SUSE Bug 1205207", url: "https://bugzilla.suse.com/1205207", }, { category: "self", summary: "SUSE Bug 1205225", url: "https://bugzilla.suse.com/1205225", }, { category: "self", summary: "SUSE Bug 1205227", url: "https://bugzilla.suse.com/1205227", }, { category: "self", summary: "SUSE Bug 1205759", url: "https://bugzilla.suse.com/1205759", }, { category: "self", summary: "SUSE Bug 1207352", url: "https://bugzilla.suse.com/1207352", }, { category: "self", summary: "SUSE Bug 1207749", url: "https://bugzilla.suse.com/1207749", }, { category: "self", summary: "SUSE Bug 1207750", url: "https://bugzilla.suse.com/1207750", }, { category: "self", summary: "SUSE Bug 1207830", url: "https://bugzilla.suse.com/1207830", }, { category: "self", summary: "SUSE Bug 1208046", url: "https://bugzilla.suse.com/1208046", }, { category: "self", summary: "SUSE Bug 1208049", url: "https://bugzilla.suse.com/1208049", }, { category: "self", summary: "SUSE Bug 1208051", url: "https://bugzilla.suse.com/1208051", }, { category: "self", summary: "SUSE Bug 1208060", url: "https://bugzilla.suse.com/1208060", }, { category: "self", summary: "SUSE Bug 1208062", url: "https://bugzilla.suse.com/1208062", }, { category: "self", summary: "SUSE Bug 1208064", url: "https://bugzilla.suse.com/1208064", }, { category: "self", summary: "SUSE Bug 1208065", url: "https://bugzilla.suse.com/1208065", }, { category: "self", summary: "SUSE Bug 1208270", url: "https://bugzilla.suse.com/1208270", }, { category: "self", summary: "SUSE Bug 1208293", url: "https://bugzilla.suse.com/1208293", }, { category: "self", summary: "SUSE Bug 1208298", url: "https://bugzilla.suse.com/1208298", }, { category: "self", summary: "SUSE Bug 1208612", url: "https://bugzilla.suse.com/1208612", }, { category: "self", summary: "SUSE Bug 1208692", url: "https://bugzilla.suse.com/1208692", }, { category: "self", summary: "SUSE Bug 1208719", url: "https://bugzilla.suse.com/1208719", }, { category: "self", summary: "SUSE Bug 1208819", url: "https://bugzilla.suse.com/1208819", }, { category: "self", summary: "SUSE Bug 1208821", url: "https://bugzilla.suse.com/1208821", }, { category: "self", summary: "SUSE Bug 1208965", url: "https://bugzilla.suse.com/1208965", }, { category: "self", summary: "SUSE Bug 1209113", url: "https://bugzilla.suse.com/1209113", }, { category: "self", summary: "SUSE Bug 1209645", url: "https://bugzilla.suse.com/1209645", }, { category: "self", summary: "SUSE Bug 1210458", url: "https://bugzilla.suse.com/1210458", }, { category: "self", summary: "SUSE Bug 1210907", url: "https://bugzilla.suse.com/1210907", }, { category: "self", summary: "SUSE Bug 1211525", url: "https://bugzilla.suse.com/1211525", }, { category: "self", summary: "SUSE Bug 1212099", url: "https://bugzilla.suse.com/1212099", }, { category: "self", summary: "SUSE Bug 1212100", url: "https://bugzilla.suse.com/1212100", }, { category: "self", summary: "SUSE Bug 1212279", url: "https://bugzilla.suse.com/1212279", }, { category: "self", summary: "SUSE Bug 1212641", url: "https://bugzilla.suse.com/1212641", }, { category: "self", summary: "SUSE Bug 1218843", url: "https://bugzilla.suse.com/1218843", }, { category: "self", summary: "SUSE Bug 1218844", url: "https://bugzilla.suse.com/1218844", }, { category: "self", summary: "SUSE CVE CVE-2020-7753 page", url: "https://www.suse.com/security/cve/CVE-2020-7753/", }, { category: "self", summary: "SUSE CVE CVE-2021-36222 page", url: "https://www.suse.com/security/cve/CVE-2021-36222/", }, { category: "self", summary: "SUSE CVE CVE-2021-3711 page", url: "https://www.suse.com/security/cve/CVE-2021-3711/", }, { category: "self", summary: "SUSE CVE CVE-2021-3807 page", url: "https://www.suse.com/security/cve/CVE-2021-3807/", }, { category: "self", summary: "SUSE CVE CVE-2021-3918 page", url: "https://www.suse.com/security/cve/CVE-2021-3918/", }, { category: "self", summary: "SUSE CVE CVE-2021-39226 page", url: "https://www.suse.com/security/cve/CVE-2021-39226/", }, { category: "self", summary: "SUSE CVE CVE-2021-41174 page", url: "https://www.suse.com/security/cve/CVE-2021-41174/", }, { category: "self", summary: "SUSE CVE CVE-2021-41244 page", url: "https://www.suse.com/security/cve/CVE-2021-41244/", }, { category: "self", summary: "SUSE CVE CVE-2021-43138 page", url: "https://www.suse.com/security/cve/CVE-2021-43138/", }, { category: "self", summary: "SUSE CVE CVE-2021-43798 page", url: "https://www.suse.com/security/cve/CVE-2021-43798/", }, { category: "self", summary: "SUSE CVE CVE-2021-43813 page", url: "https://www.suse.com/security/cve/CVE-2021-43813/", }, { category: "self", summary: "SUSE CVE CVE-2021-43815 page", url: "https://www.suse.com/security/cve/CVE-2021-43815/", }, { category: "self", summary: "SUSE CVE CVE-2022-0155 page", url: "https://www.suse.com/security/cve/CVE-2022-0155/", }, { category: "self", summary: "SUSE CVE CVE-2022-21673 page", url: "https://www.suse.com/security/cve/CVE-2022-21673/", }, { category: "self", summary: "SUSE CVE CVE-2022-21698 page", url: "https://www.suse.com/security/cve/CVE-2022-21698/", }, { category: "self", summary: "SUSE CVE CVE-2022-21702 page", url: "https://www.suse.com/security/cve/CVE-2022-21702/", }, { category: "self", summary: "SUSE CVE CVE-2022-21703 page", url: "https://www.suse.com/security/cve/CVE-2022-21703/", }, { category: "self", summary: "SUSE CVE CVE-2022-21713 page", url: "https://www.suse.com/security/cve/CVE-2022-21713/", }, { category: "self", summary: "SUSE CVE CVE-2022-23552 page", url: "https://www.suse.com/security/cve/CVE-2022-23552/", }, { category: "self", summary: "SUSE CVE CVE-2022-27191 page", url: "https://www.suse.com/security/cve/CVE-2022-27191/", }, { category: "self", summary: "SUSE CVE CVE-2022-27664 page", url: "https://www.suse.com/security/cve/CVE-2022-27664/", }, { category: "self", summary: "SUSE CVE CVE-2022-29170 page", url: "https://www.suse.com/security/cve/CVE-2022-29170/", }, { category: "self", summary: "SUSE CVE CVE-2022-31097 page", url: "https://www.suse.com/security/cve/CVE-2022-31097/", }, { category: "self", summary: "SUSE CVE CVE-2022-31107 page", url: "https://www.suse.com/security/cve/CVE-2022-31107/", }, { category: "self", summary: "SUSE CVE CVE-2022-31123 page", url: "https://www.suse.com/security/cve/CVE-2022-31123/", }, { category: "self", summary: "SUSE CVE CVE-2022-31130 page", url: "https://www.suse.com/security/cve/CVE-2022-31130/", }, { category: "self", summary: "SUSE CVE CVE-2022-32149 page", url: "https://www.suse.com/security/cve/CVE-2022-32149/", }, { category: "self", summary: "SUSE CVE CVE-2022-35957 page", url: "https://www.suse.com/security/cve/CVE-2022-35957/", }, { category: "self", summary: "SUSE CVE CVE-2022-36062 page", url: "https://www.suse.com/security/cve/CVE-2022-36062/", }, { category: "self", summary: "SUSE CVE CVE-2022-39201 page", url: "https://www.suse.com/security/cve/CVE-2022-39201/", }, { category: "self", summary: "SUSE CVE CVE-2022-39229 page", url: "https://www.suse.com/security/cve/CVE-2022-39229/", }, { category: "self", summary: "SUSE CVE CVE-2022-39306 page", url: "https://www.suse.com/security/cve/CVE-2022-39306/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, { category: "self", summary: "SUSE CVE CVE-2022-39324 page", url: "https://www.suse.com/security/cve/CVE-2022-39324/", }, { category: "self", summary: "SUSE CVE CVE-2022-41715 page", url: "https://www.suse.com/security/cve/CVE-2022-41715/", }, { category: "self", summary: "SUSE CVE CVE-2022-41723 page", url: "https://www.suse.com/security/cve/CVE-2022-41723/", }, { category: "self", summary: "SUSE CVE CVE-2022-46146 page", url: "https://www.suse.com/security/cve/CVE-2022-46146/", }, { category: "self", summary: "SUSE CVE CVE-2023-0507 page", url: "https://www.suse.com/security/cve/CVE-2023-0507/", }, { category: "self", summary: "SUSE CVE CVE-2023-0594 page", url: "https://www.suse.com/security/cve/CVE-2023-0594/", }, { category: "self", summary: "SUSE CVE CVE-2023-1387 page", url: "https://www.suse.com/security/cve/CVE-2023-1387/", }, { category: "self", summary: "SUSE CVE CVE-2023-1410 page", url: "https://www.suse.com/security/cve/CVE-2023-1410/", }, { category: "self", summary: "SUSE CVE CVE-2023-2183 page", url: "https://www.suse.com/security/cve/CVE-2023-2183/", }, { category: "self", summary: "SUSE CVE CVE-2023-2801 page", url: "https://www.suse.com/security/cve/CVE-2023-2801/", }, { category: "self", summary: "SUSE CVE CVE-2023-3128 page", url: "https://www.suse.com/security/cve/CVE-2023-3128/", }, { category: "self", summary: "SUSE CVE CVE-2023-40577 page", url: "https://www.suse.com/security/cve/CVE-2023-40577/", }, ], title: "Security Beta update for SUSE Manager Client Tools", tracking: { current_release_date: "2024-01-23T15:18:14Z", generator: { date: "2024-01-23T15:18:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0191-1", initial_release_date: "2024-01-23T15:18:14Z", revision_history: [ { date: "2024-01-23T15:18:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", product: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", product_id: "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", }, }, { category: "product_version", name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", product: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", product_id: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", }, }, { category: "product_version", name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", product: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", product_id: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", product: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", product_id: "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", }, }, { category: "product_version", name: "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", product: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", product_id: "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", }, }, { category: "product_version", name: "grafana-9.5.8-4.21.2.aarch64", product: { name: "grafana-9.5.8-4.21.2.aarch64", product_id: "grafana-9.5.8-4.21.2.aarch64", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", product: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", product_id: "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", product: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", product_id: "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", product: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", product_id: "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-3.18.2.aarch64", product: { name: "uyuni-base-common-5.0.1-3.18.2.aarch64", product_id: "uyuni-base-common-5.0.1-3.18.2.aarch64", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-3.18.2.aarch64", product: { name: "uyuni-base-proxy-5.0.1-3.18.2.aarch64", product_id: "uyuni-base-proxy-5.0.1-3.18.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", product: { name: "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", product_id: "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", }, }, { category: "product_version", name: "mgr-push-5.0.1-4.21.4.noarch", product: { name: "mgr-push-5.0.1-4.21.4.noarch", product_id: "mgr-push-5.0.1-4.21.4.noarch", }, }, { category: "product_version", name: "python2-hwdata-2.3.5-15.12.2.noarch", product: { name: "python2-hwdata-2.3.5-15.12.2.noarch", product_id: "python2-hwdata-2.3.5-15.12.2.noarch", }, }, { category: "product_version", name: "python2-mgr-push-5.0.1-4.21.4.noarch", product: { name: "python2-mgr-push-5.0.1-4.21.4.noarch", product_id: "python2-mgr-push-5.0.1-4.21.4.noarch", }, }, { category: "product_version", name: "python2-rhnlib-5.0.1-24.30.3.noarch", product: { name: "python2-rhnlib-5.0.1-24.30.3.noarch", product_id: "python2-rhnlib-5.0.1-24.30.3.noarch", }, }, { category: "product_version", name: "spacecmd-5.0.1-41.42.3.noarch", product: { name: "spacecmd-5.0.1-41.42.3.noarch", product_id: "spacecmd-5.0.1-41.42.3.noarch", }, }, { category: "product_version", name: "supportutils-plugin-salt-1.2.2-9.9.2.noarch", product: { name: "supportutils-plugin-salt-1.2.2-9.9.2.noarch", product_id: "supportutils-plugin-salt-1.2.2-9.9.2.noarch", }, }, { category: "product_version", name: "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", product: { name: "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", product_id: "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", }, }, { category: "product_version", name: "system-user-grafana-1.0.0-3.7.2.noarch", product: { name: "system-user-grafana-1.0.0-3.7.2.noarch", product_id: "system-user-grafana-1.0.0-3.7.2.noarch", }, }, { category: "product_version", name: "system-user-prometheus-1.0.0-3.7.2.noarch", product: { name: "system-user-prometheus-1.0.0-3.7.2.noarch", product_id: "system-user-prometheus-1.0.0-3.7.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", product: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", product_id: "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", }, }, { category: "product_version", name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", product: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", product_id: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", }, }, { category: "product_version", name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", product: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", product_id: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", product: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", product_id: "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", }, }, { category: "product_version", name: "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", product: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", product_id: "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", }, }, { category: "product_version", name: "grafana-9.5.8-4.21.2.ppc64le", product: { name: "grafana-9.5.8-4.21.2.ppc64le", product_id: "grafana-9.5.8-4.21.2.ppc64le", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", product: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", product_id: "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", product: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", product_id: "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", product: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", product_id: "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-3.18.2.ppc64le", product: { name: "uyuni-base-common-5.0.1-3.18.2.ppc64le", product_id: "uyuni-base-common-5.0.1-3.18.2.ppc64le", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-3.18.2.ppc64le", product: { name: "uyuni-base-proxy-5.0.1-3.18.2.ppc64le", product_id: "uyuni-base-proxy-5.0.1-3.18.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", product: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", product_id: "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", }, }, { category: "product_version", name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", product: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", product_id: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", }, }, { category: "product_version", name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", product: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", product_id: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", product: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", product_id: "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", }, }, { category: "product_version", name: "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", product: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", product_id: "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", }, }, { category: "product_version", name: "grafana-9.5.8-4.21.2.s390x", product: { name: "grafana-9.5.8-4.21.2.s390x", product_id: "grafana-9.5.8-4.21.2.s390x", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", product: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", product_id: "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", product: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", product_id: "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", product: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", product_id: "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-3.18.2.s390x", product: { name: "uyuni-base-common-5.0.1-3.18.2.s390x", product_id: "uyuni-base-common-5.0.1-3.18.2.s390x", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-3.18.2.s390x", product: { name: "uyuni-base-proxy-5.0.1-3.18.2.s390x", product_id: "uyuni-base-proxy-5.0.1-3.18.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", product: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", product_id: "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", }, }, { category: "product_version", name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", product: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", product_id: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", }, }, { category: "product_version", name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", product: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", product_id: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", product: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", product_id: "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", }, }, { category: "product_version", name: "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", product: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", product_id: "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", }, }, { category: "product_version", name: "grafana-9.5.8-4.21.2.x86_64", product: { name: "grafana-9.5.8-4.21.2.x86_64", product_id: "grafana-9.5.8-4.21.2.x86_64", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", product: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", product_id: "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", product: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", product_id: "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", product: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", product_id: "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-3.18.2.x86_64", product: { name: "uyuni-base-common-5.0.1-3.18.2.x86_64", product_id: "uyuni-base-common-5.0.1-3.18.2.x86_64", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-3.18.2.x86_64", product: { name: "uyuni-base-proxy-5.0.1-3.18.2.x86_64", product_id: "uyuni-base-proxy-5.0.1-3.18.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Manager Client Tools 12-BETA", product: { name: "SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", }, product_reference: "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", }, product_reference: "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", }, product_reference: "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", }, product_reference: "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", }, product_reference: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", }, product_reference: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", }, product_reference: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", }, product_reference: "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", }, product_reference: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", }, product_reference: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", }, product_reference: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", }, product_reference: "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", }, product_reference: "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", }, product_reference: "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", }, product_reference: "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", }, product_reference: "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-4.21.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", }, product_reference: "grafana-9.5.8-4.21.2.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-4.21.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", }, product_reference: "grafana-9.5.8-4.21.2.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-4.21.2.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", }, product_reference: "grafana-9.5.8-4.21.2.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-4.21.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", }, product_reference: "grafana-9.5.8-4.21.2.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", }, product_reference: "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", }, product_reference: "mgr-push-5.0.1-4.21.4.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", }, product_reference: "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", }, product_reference: "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", }, product_reference: "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", }, product_reference: "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", }, product_reference: "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", }, product_reference: "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-hwdata-2.3.5-15.12.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", }, product_reference: "python2-hwdata-2.3.5-15.12.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", }, product_reference: "python2-mgr-push-5.0.1-4.21.4.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-rhnlib-5.0.1-24.30.3.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", }, product_reference: "python2-rhnlib-5.0.1-24.30.3.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", }, product_reference: "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", }, product_reference: "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.s390x as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", }, product_reference: "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", }, product_reference: "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "spacecmd-5.0.1-41.42.3.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", }, product_reference: "spacecmd-5.0.1-41.42.3.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "supportutils-plugin-salt-1.2.2-9.9.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", }, product_reference: "supportutils-plugin-salt-1.2.2-9.9.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", }, product_reference: "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "system-user-grafana-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", }, product_reference: "system-user-grafana-1.0.0-3.7.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, { category: "default_component_of", full_product_name: { name: "system-user-prometheus-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA", product_id: "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", }, product_reference: "system-user-prometheus-1.0.0-3.7.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12-BETA", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-7753", }, ], notes: [ { category: "general", text: "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-7753", url: "https://www.suse.com/security/cve/CVE-2020-7753", }, { category: "external", summary: "SUSE Bug 1218843 for CVE-2020-7753", url: "https://bugzilla.suse.com/1218843", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2020-7753", }, { cve: "CVE-2021-36222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-36222", }, ], notes: [ { category: "general", text: "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-36222", url: "https://www.suse.com/security/cve/CVE-2021-36222", }, { category: "external", summary: "SUSE Bug 1188571 for CVE-2021-36222", url: "https://bugzilla.suse.com/1188571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-36222", }, { cve: "CVE-2021-3711", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3711", }, ], notes: [ { category: "general", text: "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3711", url: "https://www.suse.com/security/cve/CVE-2021-3711", }, { category: "external", summary: "SUSE Bug 1189520 for CVE-2021-3711", url: "https://bugzilla.suse.com/1189520", }, { category: "external", summary: "SUSE Bug 1190129 for CVE-2021-3711", url: "https://bugzilla.suse.com/1190129", }, { category: "external", summary: "SUSE Bug 1192100 for CVE-2021-3711", url: "https://bugzilla.suse.com/1192100", }, { category: "external", summary: "SUSE Bug 1205663 for CVE-2021-3711", url: "https://bugzilla.suse.com/1205663", }, { category: "external", summary: "SUSE Bug 1225628 for CVE-2021-3711", url: "https://bugzilla.suse.com/1225628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "critical", }, ], title: "CVE-2021-3711", }, { cve: "CVE-2021-3807", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3807", }, ], notes: [ { category: "general", text: "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3807", url: "https://www.suse.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "SUSE Bug 1192154 for CVE-2021-3807", url: "https://bugzilla.suse.com/1192154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-3807", }, { cve: "CVE-2021-3918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3918", }, ], notes: [ { category: "general", text: "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3918", url: "https://www.suse.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "SUSE Bug 1192696 for CVE-2021-3918", url: "https://bugzilla.suse.com/1192696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-3918", }, { cve: "CVE-2021-39226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39226", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-39226", url: "https://www.suse.com/security/cve/CVE-2021-39226", }, { category: "external", summary: "SUSE Bug 1191454 for CVE-2021-39226", url: "https://bugzilla.suse.com/1191454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-39226", }, { cve: "CVE-2021-41174", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41174", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor('alert(1)')()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-41174", url: "https://www.suse.com/security/cve/CVE-2021-41174", }, { category: "external", summary: "SUSE Bug 1192383 for CVE-2021-41174", url: "https://bugzilla.suse.com/1192383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2021-41174", }, { cve: "CVE-2021-41244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41244", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users' roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-41244", url: "https://www.suse.com/security/cve/CVE-2021-41244", }, { category: "external", summary: "SUSE Bug 1192763 for CVE-2021-41244", url: "https://bugzilla.suse.com/1192763", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "critical", }, ], title: "CVE-2021-41244", }, { cve: "CVE-2021-43138", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43138", }, ], notes: [ { category: "general", text: "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43138", url: "https://www.suse.com/security/cve/CVE-2021-43138", }, { category: "external", summary: "SUSE Bug 1200480 for CVE-2021-43138", url: "https://bugzilla.suse.com/1200480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-43138", }, { cve: "CVE-2021-43798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43798", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43798", url: "https://www.suse.com/security/cve/CVE-2021-43798", }, { category: "external", summary: "SUSE Bug 1193492 for CVE-2021-43798", url: "https://bugzilla.suse.com/1193492", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2021-43798", }, { cve: "CVE-2021-43813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43813", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43813", url: "https://www.suse.com/security/cve/CVE-2021-43813", }, { category: "external", summary: "SUSE Bug 1193686 for CVE-2021-43813", url: "https://bugzilla.suse.com/1193686", }, { category: "external", summary: "SUSE Bug 1193688 for CVE-2021-43813", url: "https://bugzilla.suse.com/1193688", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2021-43813", }, { cve: "CVE-2021-43815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43815", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43815", url: "https://www.suse.com/security/cve/CVE-2021-43815", }, { category: "external", summary: "SUSE Bug 1193686 for CVE-2021-43815", url: "https://bugzilla.suse.com/1193686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2021-43815", }, { cve: "CVE-2022-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0155", }, ], notes: [ { category: "general", text: "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0155", url: "https://www.suse.com/security/cve/CVE-2022-0155", }, { category: "external", summary: "SUSE Bug 1218844 for CVE-2022-0155", url: "https://bugzilla.suse.com/1218844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-0155", }, { cve: "CVE-2022-21673", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21673", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-21673", url: "https://www.suse.com/security/cve/CVE-2022-21673", }, { category: "external", summary: "SUSE Bug 1194873 for CVE-2022-21673", url: "https://bugzilla.suse.com/1194873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-21673", }, { cve: "CVE-2022-21698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21698", }, ], notes: [ { category: "general", text: "client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-21698", url: "https://www.suse.com/security/cve/CVE-2022-21698", }, { category: "external", summary: "SUSE Bug 1196338 for CVE-2022-21698", url: "https://bugzilla.suse.com/1196338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-21698", }, { cve: "CVE-2022-21702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21702", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-21702", url: "https://www.suse.com/security/cve/CVE-2022-21702", }, { category: "external", summary: "SUSE Bug 1195726 for CVE-2022-21702", url: "https://bugzilla.suse.com/1195726", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-21702", }, { cve: "CVE-2022-21703", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21703", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-21703", url: "https://www.suse.com/security/cve/CVE-2022-21703", }, { category: "external", summary: "SUSE Bug 1195727 for CVE-2022-21703", url: "https://bugzilla.suse.com/1195727", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-21703", }, { cve: "CVE-2022-21713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21713", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-21713", url: "https://www.suse.com/security/cve/CVE-2022-21713", }, { category: "external", summary: "SUSE Bug 1195728 for CVE-2022-21713", url: "https://bugzilla.suse.com/1195728", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-21713", }, { cve: "CVE-2022-23552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23552", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-23552", url: "https://www.suse.com/security/cve/CVE-2022-23552", }, { category: "external", summary: "SUSE Bug 1207749 for CVE-2022-23552", url: "https://bugzilla.suse.com/1207749", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-23552", }, { cve: "CVE-2022-27191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27191", }, ], notes: [ { category: "general", text: "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-27191", url: "https://www.suse.com/security/cve/CVE-2022-27191", }, { category: "external", summary: "SUSE Bug 1197284 for CVE-2022-27191", url: "https://bugzilla.suse.com/1197284", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-27191", }, { cve: "CVE-2022-27664", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27664", }, ], notes: [ { category: "general", text: "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-27664", url: "https://www.suse.com/security/cve/CVE-2022-27664", }, { category: "external", summary: "SUSE Bug 1203185 for CVE-2022-27664", url: "https://bugzilla.suse.com/1203185", }, { category: "external", summary: "SUSE Bug 1203293 for CVE-2022-27664", url: "https://bugzilla.suse.com/1203293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-27664", }, { cve: "CVE-2022-29170", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29170", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn't call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-29170", url: "https://www.suse.com/security/cve/CVE-2022-29170", }, { category: "external", summary: "SUSE Bug 1199810 for CVE-2022-29170", url: "https://bugzilla.suse.com/1199810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-29170", }, { cve: "CVE-2022-31097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31097", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31097", url: "https://www.suse.com/security/cve/CVE-2022-31097", }, { category: "external", summary: "SUSE Bug 1201535 for CVE-2022-31097", url: "https://bugzilla.suse.com/1201535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-31097", }, { cve: "CVE-2022-31107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31107", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user's Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31107", url: "https://www.suse.com/security/cve/CVE-2022-31107", }, { category: "external", summary: "SUSE Bug 1201539 for CVE-2022-31107", url: "https://bugzilla.suse.com/1201539", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-31107", }, { cve: "CVE-2022-31123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31123", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31123", url: "https://www.suse.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "SUSE Bug 1204302 for CVE-2022-31123", url: "https://bugzilla.suse.com/1204302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "low", }, ], title: "CVE-2022-31123", }, { cve: "CVE-2022-31130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31130", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31130", url: "https://www.suse.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "SUSE Bug 1204305 for CVE-2022-31130", url: "https://bugzilla.suse.com/1204305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-31130", }, { cve: "CVE-2022-32149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32149", }, ], notes: [ { category: "general", text: "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-32149", url: "https://www.suse.com/security/cve/CVE-2022-32149", }, { category: "external", summary: "SUSE Bug 1204501 for CVE-2022-32149", url: "https://bugzilla.suse.com/1204501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-32149", }, { cve: "CVE-2022-35957", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-35957", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-35957", url: "https://www.suse.com/security/cve/CVE-2022-35957", }, { category: "external", summary: "SUSE Bug 1203597 for CVE-2022-35957", url: "https://bugzilla.suse.com/1203597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-35957", }, { cve: "CVE-2022-36062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36062", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-36062", url: "https://www.suse.com/security/cve/CVE-2022-36062", }, { category: "external", summary: "SUSE Bug 1203596 for CVE-2022-36062", url: "https://bugzilla.suse.com/1203596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-36062", }, { cve: "CVE-2022-39201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39201", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39201", url: "https://www.suse.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "SUSE Bug 1204303 for CVE-2022-39201", url: "https://bugzilla.suse.com/1204303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-39201", }, { cve: "CVE-2022-39229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39229", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39229", url: "https://www.suse.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "SUSE Bug 1204304 for CVE-2022-39229", url: "https://bugzilla.suse.com/1204304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "low", }, ], title: "CVE-2022-39229", }, { cve: "CVE-2022-39306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39306", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39306", url: "https://www.suse.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "SUSE Bug 1205225 for CVE-2022-39306", url: "https://bugzilla.suse.com/1205225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-39307", }, { cve: "CVE-2022-39324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39324", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker's injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39324", url: "https://www.suse.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "SUSE Bug 1207750 for CVE-2022-39324", url: "https://bugzilla.suse.com/1207750", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-39324", }, { cve: "CVE-2022-41715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41715", }, ], notes: [ { category: "general", text: "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-41715", url: "https://www.suse.com/security/cve/CVE-2022-41715", }, { category: "external", summary: "SUSE Bug 1204023 for CVE-2022-41715", url: "https://bugzilla.suse.com/1204023", }, { category: "external", summary: "SUSE Bug 1208441 for CVE-2022-41715", url: "https://bugzilla.suse.com/1208441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2022-41715", }, { cve: "CVE-2022-41723", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41723", }, ], notes: [ { category: "general", text: "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-41723", url: "https://www.suse.com/security/cve/CVE-2022-41723", }, { category: "external", summary: "SUSE Bug 1208270 for CVE-2022-41723", url: "https://bugzilla.suse.com/1208270", }, { category: "external", summary: "SUSE Bug 1215588 for CVE-2022-41723", url: "https://bugzilla.suse.com/1215588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-41723", }, { cve: "CVE-2022-46146", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-46146", }, ], notes: [ { category: "general", text: "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-46146", url: "https://www.suse.com/security/cve/CVE-2022-46146", }, { category: "external", summary: "SUSE Bug 1208046 for CVE-2022-46146", url: "https://bugzilla.suse.com/1208046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2022-46146", }, { cve: "CVE-2023-0507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0507", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-0507", url: "https://www.suse.com/security/cve/CVE-2023-0507", }, { category: "external", summary: "SUSE Bug 1208821 for CVE-2023-0507", url: "https://bugzilla.suse.com/1208821", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2023-0507", }, { cve: "CVE-2023-0594", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0594", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-0594", url: "https://www.suse.com/security/cve/CVE-2023-0594", }, { category: "external", summary: "SUSE Bug 1208819 for CVE-2023-0594", url: "https://bugzilla.suse.com/1208819", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2023-0594", }, { cve: "CVE-2023-1387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1387", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-1387", url: "https://www.suse.com/security/cve/CVE-2023-1387", }, { category: "external", summary: "SUSE Bug 1210907 for CVE-2023-1387", url: "https://bugzilla.suse.com/1210907", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2023-1387", }, { cve: "CVE-2023-1410", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1410", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-1410", url: "https://www.suse.com/security/cve/CVE-2023-1410", }, { category: "external", summary: "SUSE Bug 1209645 for CVE-2023-1410", url: "https://bugzilla.suse.com/1209645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2023-1410", }, { cve: "CVE-2023-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2183", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-2183", url: "https://www.suse.com/security/cve/CVE-2023-2183", }, { category: "external", summary: "SUSE Bug 1212100 for CVE-2023-2183", url: "https://bugzilla.suse.com/1212100", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "moderate", }, ], title: "CVE-2023-2183", }, { cve: "CVE-2023-2801", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2801", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-2801", url: "https://www.suse.com/security/cve/CVE-2023-2801", }, { category: "external", summary: "SUSE Bug 1212099 for CVE-2023-2801", url: "https://bugzilla.suse.com/1212099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2023-2801", }, { cve: "CVE-2023-3128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3128", }, ], notes: [ { category: "general", text: "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. \n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-3128", url: "https://www.suse.com/security/cve/CVE-2023-3128", }, { category: "external", summary: "SUSE Bug 1212641 for CVE-2023-3128", url: "https://bugzilla.suse.com/1212641", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.4, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "critical", }, ], title: "CVE-2023-3128", }, { cve: "CVE-2023-40577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-40577", }, ], notes: [ { category: "general", text: "Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-40577", url: "https://www.suse.com/security/cve/CVE-2023-40577", }, { category: "external", summary: "SUSE Bug 1218838 for CVE-2023-40577", url: "https://bugzilla.suse.com/1218838", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:18:14Z", details: "important", }, ], title: "CVE-2023-40577", }, ], }
suse-su-2023:0352-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SUSE Manager Client Tools", title: "Title of the patch", }, { category: "description", text: "\nThis update fixes the following issues:\n\ngrafana:\n\n- Update to version 8.5.15 (jsc#PED-2617):\n * CVE-2022-39306: Fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not exists (bsc#1205227)\n- Update to version 8.5.14:\n * CVE-2022-39201: Fix do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocknig other users from signing in (bsc#1204304)\n\nkiwi-desc-saltboot:\n\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n\nmgr-osad:\n\n- Version 4.3.7-1\n * Updated logrotate configuration (bsc#1206470)\n\nmgr-push:\n\n- Version 4.3.5-1\n * Update translation strings\n\nrhnlib:\n\n- Version 4.3.5-1\n * Don't get stuck at the end of SSL transfers (bsc#1204032)\n\nspacecmd:\n\n- Version 4.3.18-1\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n- Version 4.3.17-1\n * Remove python3-simplejson dependency\n * Correctly understand 'ssm' keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Change default port of 'Containerized Proxy configuration' 8022\n\nspacewalk-client-tools:\n\n- Version 4.3.14-1\n * Update translation strings\n\nuyuni-common-libs:\n\n- Version 4.3.7-1\n * unify user notification code on java side\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-352,SUSE-SLE-Manager-Tools-12-2023-352", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0352-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0352-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230352-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0352-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html", }, { category: "self", summary: "SUSE Bug 1172110", url: "https://bugzilla.suse.com/1172110", }, { category: "self", summary: "SUSE Bug 1204032", url: "https://bugzilla.suse.com/1204032", }, { category: "self", summary: "SUSE Bug 1204126", url: "https://bugzilla.suse.com/1204126", }, { category: "self", summary: "SUSE Bug 1204302", url: "https://bugzilla.suse.com/1204302", }, { category: "self", summary: "SUSE Bug 1204303", url: "https://bugzilla.suse.com/1204303", }, { category: "self", summary: "SUSE Bug 1204304", url: "https://bugzilla.suse.com/1204304", }, { category: "self", summary: "SUSE Bug 1204305", url: "https://bugzilla.suse.com/1204305", }, { category: "self", summary: "SUSE Bug 1205207", url: "https://bugzilla.suse.com/1205207", }, { category: "self", summary: "SUSE Bug 1205225", url: "https://bugzilla.suse.com/1205225", }, { category: "self", summary: "SUSE Bug 1205227", url: "https://bugzilla.suse.com/1205227", }, { category: "self", summary: "SUSE Bug 1206470", url: "https://bugzilla.suse.com/1206470", }, { category: "self", summary: "SUSE CVE CVE-2022-31123 page", url: "https://www.suse.com/security/cve/CVE-2022-31123/", }, { category: "self", summary: "SUSE CVE CVE-2022-31130 page", url: "https://www.suse.com/security/cve/CVE-2022-31130/", }, { category: "self", summary: "SUSE CVE CVE-2022-39201 page", url: "https://www.suse.com/security/cve/CVE-2022-39201/", }, { category: "self", summary: "SUSE CVE CVE-2022-39229 page", url: "https://www.suse.com/security/cve/CVE-2022-39229/", }, { category: "self", summary: "SUSE CVE CVE-2022-39306 page", url: "https://www.suse.com/security/cve/CVE-2022-39306/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, ], title: "Security update for SUSE Manager Client Tools", tracking: { current_release_date: "2023-02-10T14:12:06Z", generator: { date: "2023-02-10T14:12:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0352-1", initial_release_date: "2023-02-10T14:12:06Z", revision_history: [ { date: "2023-02-10T14:12:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "grafana-8.5.15-1.39.1.aarch64", product: { name: "grafana-8.5.15-1.39.1.aarch64", product_id: "grafana-8.5.15-1.39.1.aarch64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.39.1.i586", product: { name: "grafana-8.5.15-1.39.1.i586", product_id: "grafana-8.5.15-1.39.1.i586", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.i586", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.i586", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", product: { name: "kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", product_id: "kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", }, }, { category: "product_version", name: "mgr-osa-dispatcher-4.3.7-1.42.1.noarch", product: { name: "mgr-osa-dispatcher-4.3.7-1.42.1.noarch", product_id: "mgr-osa-dispatcher-4.3.7-1.42.1.noarch", }, }, { category: "product_version", name: "mgr-osad-4.3.7-1.42.1.noarch", product: { name: "mgr-osad-4.3.7-1.42.1.noarch", product_id: "mgr-osad-4.3.7-1.42.1.noarch", }, }, { category: "product_version", name: "mgr-push-4.3.5-1.24.1.noarch", product: { name: "mgr-push-4.3.5-1.24.1.noarch", product_id: "mgr-push-4.3.5-1.24.1.noarch", }, }, { category: "product_version", name: "python2-mgr-osa-common-4.3.7-1.42.1.noarch", product: { name: "python2-mgr-osa-common-4.3.7-1.42.1.noarch", product_id: "python2-mgr-osa-common-4.3.7-1.42.1.noarch", }, }, { category: "product_version", name: "python2-mgr-osa-dispatcher-4.3.7-1.42.1.noarch", product: { name: "python2-mgr-osa-dispatcher-4.3.7-1.42.1.noarch", product_id: "python2-mgr-osa-dispatcher-4.3.7-1.42.1.noarch", }, }, { category: "product_version", name: "python2-mgr-osad-4.3.7-1.42.1.noarch", product: { name: "python2-mgr-osad-4.3.7-1.42.1.noarch", product_id: "python2-mgr-osad-4.3.7-1.42.1.noarch", }, }, { category: "product_version", name: "python2-mgr-push-4.3.5-1.24.1.noarch", product: { name: "python2-mgr-push-4.3.5-1.24.1.noarch", product_id: "python2-mgr-push-4.3.5-1.24.1.noarch", }, }, { category: "product_version", name: "python2-rhnlib-4.3.5-21.46.1.noarch", product: { name: "python2-rhnlib-4.3.5-21.46.1.noarch", product_id: "python2-rhnlib-4.3.5-21.46.1.noarch", }, }, { category: "product_version", name: "python2-spacewalk-check-4.3.14-52.83.1.noarch", product: { name: "python2-spacewalk-check-4.3.14-52.83.1.noarch", product_id: "python2-spacewalk-check-4.3.14-52.83.1.noarch", }, }, { category: "product_version", name: "python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", product: { name: "python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", product_id: "python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", }, }, { category: "product_version", name: "python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", product: { name: "python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", product_id: "python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", }, }, { category: "product_version", name: "spacecmd-4.3.18-38.115.1.noarch", product: { name: "spacecmd-4.3.18-38.115.1.noarch", product_id: "spacecmd-4.3.18-38.115.1.noarch", }, }, { category: "product_version", name: "spacewalk-check-4.3.14-52.83.1.noarch", product: { name: "spacewalk-check-4.3.14-52.83.1.noarch", product_id: "spacewalk-check-4.3.14-52.83.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-setup-4.3.14-52.83.1.noarch", product: { name: "spacewalk-client-setup-4.3.14-52.83.1.noarch", product_id: "spacewalk-client-setup-4.3.14-52.83.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-tools-4.3.14-52.83.1.noarch", product: { name: "spacewalk-client-tools-4.3.14-52.83.1.noarch", product_id: "spacewalk-client-tools-4.3.14-52.83.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.39.1.ppc64le", product: { name: "grafana-8.5.15-1.39.1.ppc64le", product_id: "grafana-8.5.15-1.39.1.ppc64le", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.s390", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.s390", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.39.1.s390x", product: { name: "grafana-8.5.15-1.39.1.s390x", product_id: "grafana-8.5.15-1.39.1.s390x", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.s390x", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.s390x", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.39.1.x86_64", product: { name: "grafana-8.5.15-1.39.1.x86_64", product_id: "grafana-8.5.15-1.39.1.x86_64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", product: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", product_id: "python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Manager Client Tools 12", product: { name: "SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.39.1.aarch64 as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", }, product_reference: "grafana-8.5.15-1.39.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.39.1.ppc64le as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", }, product_reference: "grafana-8.5.15-1.39.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.39.1.s390x as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", }, product_reference: "grafana-8.5.15-1.39.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.39.1.x86_64 as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", }, product_reference: "grafana-8.5.15-1.39.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", }, product_reference: "kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "mgr-osad-4.3.7-1.42.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", }, product_reference: "mgr-osad-4.3.7-1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "mgr-push-4.3.5-1.24.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", }, product_reference: "mgr-push-4.3.5-1.24.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-mgr-osa-common-4.3.7-1.42.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", }, product_reference: "python2-mgr-osa-common-4.3.7-1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-mgr-osad-4.3.7-1.42.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", }, product_reference: "python2-mgr-osad-4.3.7-1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-mgr-push-4.3.5-1.24.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", }, product_reference: "python2-mgr-push-4.3.5-1.24.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-rhnlib-4.3.5-21.46.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", }, product_reference: "python2-rhnlib-4.3.5-21.46.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-spacewalk-check-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", }, product_reference: "python2-spacewalk-check-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-spacewalk-client-setup-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", }, product_reference: "python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-spacewalk-client-tools-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", }, product_reference: "python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.aarch64 as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", }, product_reference: "python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", }, product_reference: "python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.s390x as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", }, product_reference: "python2-uyuni-common-libs-4.3.7-1.30.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "python2-uyuni-common-libs-4.3.7-1.30.1.x86_64 as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", }, product_reference: "python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "spacecmd-4.3.18-38.115.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", }, product_reference: "spacecmd-4.3.18-38.115.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "spacewalk-check-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", }, product_reference: "spacewalk-check-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-setup-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", }, product_reference: "spacewalk-client-setup-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-tools-4.3.14-52.83.1.noarch as component of SUSE Manager Client Tools 12", product_id: "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", }, product_reference: "spacewalk-client-tools-4.3.14-52.83.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 12", }, ], }, vulnerabilities: [ { cve: "CVE-2022-31123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31123", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31123", url: "https://www.suse.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "SUSE Bug 1204302 for CVE-2022-31123", url: "https://bugzilla.suse.com/1204302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "low", }, ], title: "CVE-2022-31123", }, { cve: "CVE-2022-31130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31130", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31130", url: "https://www.suse.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "SUSE Bug 1204305 for CVE-2022-31130", url: "https://bugzilla.suse.com/1204305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "moderate", }, ], title: "CVE-2022-31130", }, { cve: "CVE-2022-39201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39201", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39201", url: "https://www.suse.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "SUSE Bug 1204303 for CVE-2022-39201", url: "https://bugzilla.suse.com/1204303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "moderate", }, ], title: "CVE-2022-39201", }, { cve: "CVE-2022-39229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39229", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39229", url: "https://www.suse.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "SUSE Bug 1204304 for CVE-2022-39229", url: "https://bugzilla.suse.com/1204304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "low", }, ], title: "CVE-2022-39229", }, { cve: "CVE-2022-39306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39306", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39306", url: "https://www.suse.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "SUSE Bug 1205225 for CVE-2022-39306", url: "https://bugzilla.suse.com/1205225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "moderate", }, ], title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.s390x", "SUSE Manager Client Tools 12:grafana-8.5.15-1.39.1.x86_64", "SUSE Manager Client Tools 12:kiwi-desc-saltboot-0.1.1673279145.e7616bd-1.32.1.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.7-1.42.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.5-1.24.1.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.5-21.46.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.7-1.30.1.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.18-38.115.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.14-52.83.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.14-52.83.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:06Z", details: "moderate", }, ], title: "CVE-2022-39307", }, ], }
suse-su-2023:0362-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for grafana", title: "Title of the patch", }, { category: "description", text: "This update for grafana fixes the following issues:\n\n- Version update from 8.5.13 to 8.5.15 (jsc#PED-2617):\n * CVE-2022-39306: Security fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not exists (bsc#1205227)\n * CVE-2022-39201: Do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocking other users from signing in (bsc#1204304)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-362,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-362,openSUSE-SLE-15.4-2023-362", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0362-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0362-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230362-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0362-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html", }, { category: "self", summary: "SUSE Bug 1204302", url: "https://bugzilla.suse.com/1204302", }, { category: "self", summary: "SUSE Bug 1204303", url: "https://bugzilla.suse.com/1204303", }, { category: "self", summary: "SUSE Bug 1204304", url: "https://bugzilla.suse.com/1204304", }, { category: "self", summary: "SUSE Bug 1204305", url: "https://bugzilla.suse.com/1204305", }, { category: "self", summary: "SUSE Bug 1205225", url: "https://bugzilla.suse.com/1205225", }, { category: "self", summary: "SUSE Bug 1205227", url: "https://bugzilla.suse.com/1205227", }, { category: "self", summary: "SUSE CVE CVE-2022-31123 page", url: "https://www.suse.com/security/cve/CVE-2022-31123/", }, { category: "self", summary: "SUSE CVE CVE-2022-31130 page", url: "https://www.suse.com/security/cve/CVE-2022-31130/", }, { category: "self", summary: "SUSE CVE CVE-2022-39201 page", url: "https://www.suse.com/security/cve/CVE-2022-39201/", }, { category: "self", summary: "SUSE CVE CVE-2022-39229 page", url: "https://www.suse.com/security/cve/CVE-2022-39229/", }, { category: "self", summary: "SUSE CVE CVE-2022-39306 page", url: "https://www.suse.com/security/cve/CVE-2022-39306/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, ], title: "Security update for grafana", tracking: { current_release_date: "2023-02-10T14:15:47Z", generator: { date: "2023-02-10T14:15:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0362-1", initial_release_date: "2023-02-10T14:15:47Z", revision_history: [ { date: "2023-02-10T14:15:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "grafana-8.5.15-150200.3.32.1.aarch64", product: { name: "grafana-8.5.15-150200.3.32.1.aarch64", product_id: "grafana-8.5.15-150200.3.32.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150200.3.32.1.i586", product: { name: "grafana-8.5.15-150200.3.32.1.i586", product_id: "grafana-8.5.15-150200.3.32.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150200.3.32.1.ppc64le", product: { name: "grafana-8.5.15-150200.3.32.1.ppc64le", product_id: "grafana-8.5.15-150200.3.32.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150200.3.32.1.s390x", product: { name: "grafana-8.5.15-150200.3.32.1.s390x", product_id: "grafana-8.5.15-150200.3.32.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150200.3.32.1.x86_64", product: { name: "grafana-8.5.15-150200.3.32.1.x86_64", product_id: "grafana-8.5.15-150200.3.32.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", }, product_reference: "grafana-8.5.15-150200.3.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", }, product_reference: "grafana-8.5.15-150200.3.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", }, product_reference: "grafana-8.5.15-150200.3.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", }, product_reference: "grafana-8.5.15-150200.3.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", }, product_reference: "grafana-8.5.15-150200.3.32.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", }, product_reference: "grafana-8.5.15-150200.3.32.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", }, product_reference: "grafana-8.5.15-150200.3.32.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150200.3.32.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", }, product_reference: "grafana-8.5.15-150200.3.32.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-31123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31123", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31123", url: "https://www.suse.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "SUSE Bug 1204302 for CVE-2022-31123", url: "https://bugzilla.suse.com/1204302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "low", }, ], title: "CVE-2022-31123", }, { cve: "CVE-2022-31130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31130", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31130", url: "https://www.suse.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "SUSE Bug 1204305 for CVE-2022-31130", url: "https://bugzilla.suse.com/1204305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "moderate", }, ], title: "CVE-2022-31130", }, { cve: "CVE-2022-39201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39201", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39201", url: "https://www.suse.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "SUSE Bug 1204303 for CVE-2022-39201", url: "https://bugzilla.suse.com/1204303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "moderate", }, ], title: "CVE-2022-39201", }, { cve: "CVE-2022-39229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39229", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39229", url: "https://www.suse.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "SUSE Bug 1204304 for CVE-2022-39229", url: "https://bugzilla.suse.com/1204304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "low", }, ], title: "CVE-2022-39229", }, { cve: "CVE-2022-39306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39306", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39306", url: "https://www.suse.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "SUSE Bug 1205225 for CVE-2022-39306", url: "https://bugzilla.suse.com/1205225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "moderate", }, ], title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.15-150200.3.32.1.x86_64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.aarch64", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.ppc64le", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.s390x", "openSUSE Leap 15.4:grafana-8.5.15-150200.3.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:15:47Z", details: "moderate", }, ], title: "CVE-2022-39307", }, ], }
suse-su-2024:0196-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security Beta update for SUSE Manager Client Tools and Salt", title: "Title of the patch", }, { category: "description", text: "This update fixes the following issues:\n\nansible:\n\n- Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133)\n * bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive\n info in traceback error message (in 2.9.27)\n * bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line\n strings with ansible facts used in template. (in 2.9.23)\n * bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in\n ansible 2.9.13 (in 2.9.15)\n- Update to 2.9.22:\n * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values \n * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option\n * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values\n * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values\n * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module\n\ndracut-saltboot:\n\n- Update to version 0.1.1681904360.84ef141 \n * Load network configuration even when missing protocol version\n (bsc#1210640)\n- Update to verion 0.1.1674034019.a93ff61\n * Install copied wicked config as client.xml (bsc#1205599)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n * Copy existing wicked config instead of generating new (bsc#1205599)\n- Update to version 0.1.1665997480.587fa10\n * Add dependencies on xz and gzip to support compressed images\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Move image services to dracut-saltboot package\n * Use salt bundle\n- Require e2fsprogs (bsc#1202614)\n- Update to version 0.1.1657643023.0d694ce\n * Update dracut-saltboot dependencies (bsc#1200970)\n * Fix network loading when ipappend is used in pxe config\n * Add new information messages\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Remove license file from %doc\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go >= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL >= 8\n- Build with Go >= 1.20 when the OS is not RHEL\n- Spec file clean up\n- Fix apparmor profile for SLE 12\n- Do not build with apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build with Go 1.19\n- Build using promu\n- Add _service file\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * Fix denial of service vulnerability\n (CVE-2022-32149, bsc#1204501)\n- Upgrade to version 0.13.3\n * Fix uncontrolled resource consumption\n (CVE-2022-41723, bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * Fix authentication bypass vulnarability\n (CVE-2022-46146, bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format\n flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to\n remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n + Adjust dependencies on spec file \n + Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape 'float histograms' or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add 'keep_firing_for' field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target's scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type='exemplar' label instead of type='unknown' for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during 'make clean'\n- Remove web-ui archives during 'make clean'.\n- Require promu >= 0.14.0 for building\n- Drop:\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] Fix basic authentication bypass vulnerability\n (CVE-2022-46146, bsc#1208049, jsc#PED-3576).\n- Upgrade to version 2.37.3\n * [BUGFIX] Update our regexp library to fix upstream\n CVE-2022-41715.\n- Upgrade to version 2.37.2\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don't increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (CVE-2022-46146, bsc#1208049)\n- Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (CVE-2022-41723, bsc#1208298)\n- Restructure the spec to build web assets online\n * Makefile\n\ngrafana:\n\n- Update to version 9.5.8:\n * Features and enhancements\n GenericOAuth: Set sub as auth id\n * Bug fixes:\n DataSourceProxy: Fix url validation error handling\n- Update to version 9.5.7:\n Alerting: Sort NumberCaptureValues in EvaluationString\n Alerting: Improve performance of matching captures\n Alerting: No longer silence paused alerts during legacy\n migration\n Alerting: Remove and revert flag alertingBigTransactions\n Alerting: Migrate unknown NoData\\Error settings to the default\n Tracing: supply Grafana build version\n Tempo: Escape regex-sensitive characters in span name before\n building promql query\n Plugins: Only configure plugin proxy transport once\n Alerting: Fix unique violation when updating rule group with\n title chains/cycles\n Prometheus: Version detect bug\n Prometheus: Fix heatmap format with no data\n Database: Change getExistingDashboardByTitleAndFolder to get\n dashboard by title, not slug \n Alerting: Convert 'Both' type Prometheus queries to 'Range' in\n SQLStore: Fix Postgres dialect treating 'false' migrator\n default as true\n Alerting: Support newer http_config struct\n InfluxDB: Interpolate retention policies\n StatusHistory: Fix rendering of value-mapped null\n Alerting: Fix provenance guard checks for Alertmanager\n configuration to not cause panic when compared nested\n objects\n AnonymousAuth: Fix concurrent read-write crash\n AzureMonitor: Ensure legacy properties containing template\n variables are correctly migrated\n Explore: Remove data source onboarding page\n Dashboard: Re-align Save form\n Azure Monitor: Fix bug that did not show alert rule preview\n Histogram: Respect min/max panel settings for x-axis\n Heatmap: Fix color rendering for value ranges < 1\n Heatmap: Handle unsorted timestamps in calculate mode\n Google Cloud Monitor: Fix mem usage for dropdown\n AzureMonitor: Fix logs query multi-resource and timespan values\n Utils: Reimplement util.GetRandomString to avoid modulo bias\n Alerting: Fix matching labels with spaces in their values\n Dashboard: Fix applying timezone to datetime variables\n Dashboard: Fix panel description event triggering every time\n panel is rendered\n Tempo: Fix get label values based on CoreApp type\n Heatmap: Fix log scale editor\n Dashboard: Fix disappearing panel when viewed panel is\n refreshed\n Prometheus: Fix bug in creating autocomplete queries with\n labels\n Prometheus: Fix Query Inspector expression range value\n Alerting: Fix migration failing if alert_configuration table is\n not empty\n InfluxDB: Fix querying retention policies on flux mode\n- Update to version 9.5.6:\n * Bug fixes\n Dashboard: Fix library panels in collapsed rows not getting\n updated\n Auth: Add and document option for enabling email lookup\n- Update to version 9.5.5:\n Security: Fix authentication bypass using Azure AD OAuth\n (bsc#1212641, CVE-2023-3128, jsc#PED-3694).\n Auth: Show invite button if disable login form is set to false.\n Azure: Fix Kusto auto-completion for Azure datasources.\n RBAC: Remove legacy AC editor and admin role on new dashboard\n route.\n API: Revert allowing editors to access GET /datasources. \n Settings: Add ability to override skip_org_role_sync with Env\n variables.\n- Update to version 9.5.3:\n Query: Prevent crash while executing concurrent mixed queries\n (bsc#1212099, CVE-2023-2801).\n Alerting: Require alert.notifications:write permissions to test\n receivers and templates (bsc#1212100, CVE-2023-2183).\n- Update to version 9.5.2:\n Alerting: Scheduler use rule fingerprint instead of version.\n Explore: Update table min height.\n DataLinks: Encoded URL fixed.\n TimeSeries: Fix leading null-fill for missing intervals.\n Dashboard: Revert fixed header shown on mobile devices in the\n new panel header.\n PostgreSQL: Fix TLS certificate issue by downgrading lib/pq.\n Provisioning: Fix provisioning issues with legacy alerting and\n data source permissions.\n Alerting: Fix misleading status code in provisioning API.\n Loki: Fix log samples using `instant` queries.\n Panel Header: Implement new Panel Header on Angular Panels.\n Azure Monitor: Fix bug that was not showing resources for\n certain locations.\n Alerting: Fix panic when reparenting receivers to groups\n following an attempted rename via Provisioning.\n Cloudwatch Logs: Clarify Cloudwatch Logs Limits.\n- Update to 9.5.1\n Loki Variable Query Editor: Fix bug when the query is updated\n Expressions: Fix expression load with legacy UID -100\n- Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694)\n * Breaking changes\n - default named retention policies won't be used to query.\n Users who have a default named retention policy in their\n influxdb database, have to rename it to something else.\n Having default named retention policy is not breaking\n anything. We will make sure to use the actual default\n retention policy under the hood. To change the hardcoded\n retention policy in the dashboard.json, users must they\n select the right retention policy from dropdown and save the\n panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to\n Alerting will now respect 'For' duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and\n Admin roles, but grant Grafana Server Admin role manually\n will not be able to do that anymore. After this change, LDAP\n role sync will override any manual changes to Grafana Server\n Admin role assignments. If grafana_admin is left unset in\n LDAP role mapping configuration, it will default to false.\n API keys: Add deprecation to api keys.\n API: Enable serving Swagger UI by default and add docs and\n guidelines.\n API: Permit Cache-Control (browser caching) for datasource\n resources.\n Accessibility: Make row actions keyboard accessible.\n Admin/Plugins: Set category filter in connections link.\n Alerting: Add CustomDetails field in PagerDuty contact point.\n Alerting: Add dashboard and panel links to rule and instance\n annotations.\n Alerting: Add filter and remove funcs for custom labels and\n Alerting: Add fuzzy search to alert list view.\n Alerting: Add metrics for active receiver and integrations.\n Alerting: Better printing of labels.\n Alerting: Create new state history 'fanout' backend that\n dispatches to multiple other backends at once.\n Alerting: Enable preview for recording rules.\n Alerting: Fetch all applied alerting configurations.\n Alerting: Introduce proper feature toggles for common state\n history backend combinations.\n Alerting: Make time range query parameters not required when\n querying Loki.\n Alerting: New notification policies view.\n Alerting: No longer index state history log streams by\n instance labels.\n Alerting: Respect 'For' Duration for NoData alerts.\n Alerting: Support filtering rules by multiple datasources.\n Alerting: Switch to snappy-compressed-protobuf for outgoing\n push requests to Loki.\n Angular: Prevent angular from loading when disabled.\n Auth: Add Generic oauth skip org role sync setting.\n Auth: Add feature flag to move token rotation to client.\n Auth: Show user sync external Authentication status.\n Backend: Use sdk version 0.148.0.\n Chore: Add stat for remote cache config.\n Chore: Replace short UID generation with more standard UUIDs.\n Chore: Use DOMPurify to sanitize strings rather than js-xss.\n CloudMonitoring: Add possibility to use path for private key.\n CloudWatch Logs: Update default timeout to 30m.\n CloudWatch: Add AWS/IotSiteWise namespace and metrics.\n CloudWatch: Add account support to variable queries.\n CloudWatch: Make deeplinks work for us-gov and china regions.\n Cloudwatch: Add MeteredIOBytes metric for EFS.\n Command Palette: Display dashboard location.\n Command palette: Enable folder searching.\n Connections: Turn on feature toggle by default.\n Cookies: Provide a mechanism for per user control over cookies.\n Dashboard Datasource: Update Query List & Improve UX.\n Dashboard: Add a feature that creates a table panel when a\n spreadsheet file is dropped on the dashboard.\n Dashboard: Add new visualization/row/library panel/pasted\n panel is now a dropdown menu.\n Dashboard: Add value format for requests per minute.\n Dashboard: Empty/No Panels dashboard with a new design.\n Dashboard: When dashboard is not found show message instead\n of empty page.\n Dashboards: Enable feature flag newPanelChromeUI by default.\n Dataplane: Support timeSeriesLong without transform.\n Datasources: Add user_agent header customization for outgoing\n HTTP requests.\n Datasources: Use getDefaultQuery in annotations editors.\n Docs: Add documentation on how to debug backend plugins.\n Docs: Deprecate dashboard previews.\n Elasticsearch: Detect Elasticsearch version.\n Elasticsearch: Run Explore queries trough data source backend.\n Explore: Add range option to internal data links.\n Explore: Add transformations to correlation data links.\n Explore: Support mixed data sources for supplementary query.\n Extensions: Expose an enum for available placements.\n Feat: Changing link destination for get more plugins.\n Feat: Linking to plugin details page rather than externally\n for new datasources.\n FieldMatchers: Add match by value (reducer).\n Flame graph: Add context menu.\n Flame graph: Add metadata above flame graph.\n Geomap: Improve tooltip url for photos layer.\n Geomap: Release night / day layer.\n InfluxDB: Move database information into jsondata.\n Jaeger and Zipkin: Config & docs upgrade.\n LDAP: Allow setting minimum TLS version and accepted ciphers.\n Live: Remove (alpha) ability to configure live pipelines.\n Logger: Add feature toggle for errors in HTTP request logs.\n Login: Allow custom name and icon for social providers.\n Logs Panel: Refactor style generation to improve rendering\n performance.\n Logs: Add millisecond to timestamp in log line.\n Logs: Rename dedup to deduplicate.\n Loki Query Editor: Make Monaco the default editor.\n Loki: Add unpack query builder hint.\n Loki: Add descriptions to query builder operations.\n Loki: Add placeholder to the loki query editor.\n Loki: Always fetch for new label keys in the QueryBuilder.\n Loki: Display error with label filter conflicts.\n Loki: Improve the display of loki query stats.\n MSSQL/Postgres: List views in table dropdown as well.\n MSSQL: Update forked go-mssqldb dependency.\n Metrics: Update comment to mention folders instead of\n dashboards.\n Navigation: Enable new navigation by default.\n NodeGraph: Support icons for nodes.\n Notifications: Enable display of trace ID by default.\n Packaging: Start Grafana service after InfluxDB.\n Panel Header: Add CancelQuery option to panel header.\n Panel: Show multiple errors info in the inspector.\n PanelChrome: Add option to show actions on the right side\n (actions = leftItems).\n Phlare: Allow variables in labelSelector (in query).\n Plugin: Skip preloading disabled app plugins.\n Plugins: Add optional logger for plugin requests sent to backend\n plugins.\n Plugins: Extend panel menu with commands from plugins.\n Plugins: Extend panel menu with links from plugins.\n Plugins: Improve instrumentation by adding metrics and tracing.\n Plugins: Support for distributed tracing in backend plugins SDK.\n Plugins: Support for link extensions.\n Profiling: Enable flame graph & Phlare/Parca data sources for\n all users.\n Prometheus Datasource: Improve Prom query variable editor.\n Prometheus Metrics: Add missing stat_total_teams metric.\n Prometheus/Loki: Run query explicitly instead of onblur in panel\n edit.\n Prometheus: Browser resource caching.\n Prometheus: Improve prometheus query variable editor.\n Prometheus: Use $__rate_interval for rate queries generated by\n metric browser.\n Pubdash: Email sharing handle dashboard deleted.\n PublicDashboards: Backfills share column with default value.\n PublicDashboards: Configuration modal redesign.\n PublicDashboards: Email sharing.\n PublicDashboards: Enable creation when dashboard has template\n variables.\n PublicDashboards: Paused or deleted public dashboard screen.\n QueryHistory: Improve handling of mixed datasource entries.\n Rendering: Experimental support to use JWTs as auth method.\n SQL Datasources: Add back help content.\n Schema: Remove exclusion for timeseries and update imports.\n Search: Improvements for starred dashboard search.\n Select: Show icon in the grafana/ui Select component.\n Service accounts: Creation logic simplification.\n Service accounts: Remove Add API keys buttons and remove one\n state of migrating for API keys tab.\n SplitOpen: Update API to accept multiple queries.\n Stat Panel: Add an option for a non-gradient/solid background.\n Stat: Add ability to remove default single-color background\n gradient.\n SupportBundles: Add OAuth bundle collectors.\n Table Panel: Add ability to use text color for value or hide\n value in gauge cell.\n Table: Introduce sparkline cell type.\n Tempo: Config and doc updates.\n Tempo: Update service graph view and docs.\n TraceView: Add key and url escaping of json tag values.\n TraceView: Reworked header.\n Tracing: Add more detail to HTTP Outgoing Request.\n Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin.\n Tracing: Support multiple OTel propagators.\n Transformations: Support time format when converting time to\n strings.\n Transformers: Support adding the row index using calculate\n field transformer.\n Units: Format currency with negative before the symbol.\n API: Fix 'Updated by' Column in dashboard versions table.\n AccessControl: Allow editors to access GET /api/datasources.\n Alerting: Add 'backend' label to state history writes metrics.\n Alerting: Add alert instance labels to Loki log lines in\n addition to stream labels.\n Alerting: Elide requests to Loki if nothing should be recorded.\n Alerting: Fix DatasourceUID and RefID missing for\n DatasourceNoData alerts.\n Alerting: Fix ambiguous handling of equals in labels when\n bucketing Loki state history streams.\n Alerting: Fix attachment of external labels to Loki state\n history log streams.\n Alerting: Fix creating a recording rule when having multiple\n datasources.\n Alerting: Fix explore link in alert detail view.\n Alerting: Fix share URL for Prometheus rules on subpath.\n Alerting: Fix stats that display alert count when using unified\n alerting.\n Alerting: Hide mute timing actions when dealing with vanilla\n prometheus.\n Alerting: Paginate result previews.\n Alerting: Prometheus-compatible Alertmanager timings editor.\n Alerting: Update scheduler to get updates only from database.\n Alerting: Use a completely isolated context for state history\n writes.\n Alerting: Use displayNameFromDS if available in preview.\n Annotation List: Fix panel not updating when variable is\n changed.\n Annotations: Ignore unique constraint violations for tags.\n Auth: Fix orgrole picker disabled if isSynced user.\n AzureMonitor: Fix Log Analytics portal links.\n BrowseDashboards: Fix move to General folder not working.\n Catalog: Show install error with incompatible version.\n Chore: Update Grafana to use Alertmanager\n v0.25.1-0.20230308154952-78fedf89728b.\n CloudMonitoring: Add project selector for MQL editor[fix].\n CloudWatch Logs: Fix running logs queries with expressions.\n CloudWatch Logs: Fix to make log queries use a relative time if\n available.\n CloudWatch Logs: Revert 'Queries in an expression should run\n synchronously'.\n CloudWatch: Fix cachedQueries insights not being updated for\n metric queries.\n Cloudwatch: Pass refId from query for expression queries.\n Dashboards: Evaluate provisioned dashboard titles in a\n backwards compatible way.\n Dashboards: Fix broken internal data links.\n Database: Don't sleep 10ms before every request.\n Elasticsearch: Fix processing of response with multiple group\n by for alerting.\n Elasticsearch: Handle multiple annotation structures.\n Email: Mark HTML comments as 'safe' in email templates.\n ErrorHandling: Fixes issues with bad error messages.\n ErrorView: Better detection of no-data responses.\n Explore: Make DataSourcePicker visible on small screens.\n Fix: DataLinks from data sources override user defined data\n link.\n Fix: Top table rendering and update docs.\n Frontend: Fix broken links in /plugins when pathname has a\n trailing slash.\n Geomap: Fix route layer zoom behavior.\n Google Cloud Monitoring: Fix project variable.\n HeatMap: Sort y buckets when all bucket names are numeric.\n InfluxDB: Fix querying with hardcoded retention policy.\n InfluxDB: Fix sending retention policy with InfluxQL queries.\n KVStore: Include database field in migration.\n LDAP: Always synchronize Server Admin role through role sync if\n role sync is enabled.\n Library panels: Ensure pagination controls are always correctly\n displayed.\n Loki: Fix autocomplete situations with multiple escaped quotes.\n MegaMenu: Fixes mega menu showing scroll indicator when it\n shouldn't.\n Navigation: Redirect to root page when switching organization.\n Navigation: Scrolled hamburger menu links now navigate correctly\n in Safari.\n NestedFolders: Fix nested folder deletion.\n New Panel Header: Fix when clicking submenu item the parent\n menu item onClick get's triggered.\n Phlare: Fix error when there are no profileTypes to send from\n backend.\n PieChart: Show long labels properly.\n PluginExtensions: Fixed issue with incorrect type being\n exposed when configuring an extension.\n Plugins: Ensure proxy route bodies are valid JSON.\n Plugins: Fix width for README pages with tables.\n Plugins: Markdown fetch retry with lowercase.\n Plugins: Skip instrumenting plugin build info for core and\n bundled plugins.\n PublicDashboards: Query collapsed panels inside rows.\n Query Splitting: Fix for handling queries with no requestId.\n SQL Datasources: Fix variable throwing error if query returns no\n data.\n SQL Datasources: Prevent Call Stack Overflows with Large\n Numbers of Values for Variable.\n SQLStore: Fix SQLite error propagation if query retries are\n disabled.\n Stat Panel: Fix issue with clipping text values.\n Table Panel: Fix panel migration for options cell type.\n Table: Fix migrations from old angular table for cell color\n modes.\n Table: Fixes issue with pagination summary causing scrollbar.\n Table: Fixes table panel gauge alignment.\n TablePanel: Fix table cells overflowing when there are\n multiple data links.\n TablePanel: fix footer bug; no footer calculated values after\n 'hidden' column override.\n Templating: Allow percent encoding of variable with custom all.\n Tempo: Set default limit if none is provided for traceql\n queries.\n TimeSeries: Don't extend stepped interpolation to graph edges.\n TimeSeries: Improve stacking direction heuristic.\n Trace View: Update the queryType to traceql for checking if\n same trace when clicking span link.\n TraceView: Don't require preferredVisualisationType to render.\n Utils: Reimplement util.GetRandomString to avoid modulo bias.\n XYChart: Add all dataset columns in tooltip.\n * Plugin development fixes & changes\n DateTimePicker: Can now select time correctly.\n Grafana UI: Fix tooltip prop of button component.\n DateTimePicker: Add min date support to calendar.\n GrafanaUI: Implement new component Toggletip.\n ContextMenu: Fix padding and show border based on items.\n- Update to 9.4.7 (2023-03-16)\n Alerting: Update scheduler to receive rule updates only from\n database.\n Influxdb: Re-introduce backend migration feature toggle.\n Security: Fixes for CVE-2023-1410.\n The InfluxDB backend migration feature toggle\n (influxdbBackendMigration) has been reintroduced in this\n version as issues were discovered with backend processing of\n InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend\n processing is the default behavior.\n In Grafana 9.4.4, InfluxDB data parsing started to be handled\n in the backend. If you have upgraded to 9.4.4 and then added\n new transformations on InfluxDB data, those panels will fail to\n render. To resolve this either:\n Remove the affected panel and re-create it or\n edit the `time` field as `Time` in `panel.json` or\n `dashboard.json`\n as the exporter toolkit has been updated by upstream\n- Install wrapper scripts under /usr/sbin\n- Install actual binaries under /usr/libexec/grafana (or /usr/lib\n under older distributions) and create a simlink for wrapper\n scripts and the service (which expect the binary to be under\n /usr/share/grafana/bin)\n- Update to 9.4.3\n Alerting: Use background context for maintenance function.\n- Update to 9.4.2\n Alerting: Fix boolean default in migration from false to 0.\n- Update to 9.4.0\n Alerting: Add endpoint for querying state history.\n Alerting: Add label query parameters to state history endpoint.\n Alerting: Add static label to all state history entries.\n Alerting: Mark AM configuration as applied.\n Azure Monitor: Enable multiple resource queries.\n Query Caching: Add per-panel query caching TTL.\n Table: Add row number column option.\n Tempo: Remove tempoApmTable feature flag.\n Transformations: Selectively apply transformation to queries.\n AccessControl: Clear user permission cache for update org user\n role.\n Alerting: Fix handling of special floating-point cases\n when writing observed values to annotations.\n Auth: Rotate token patch.\n ContextMenu: Consider y coord when determining bottom\n collision.\n Elasticsearch: Fix consistent label order in alerting.\n Explore: Fix graph not updating when changing config.\n Heatmap: Support heatmap rows with non-timeseries X axis.\n Login: Fix panic when a user is upserted by a background\n process.\n MSSQL: Add support for macro function calls.\n MySQL: Quote identifiers that include special characters.\n Navigation: Sign in button now works correctly when\n served under a sub path.\n Nested Folder: Fix for SQLite not to overwrite the parent on\n restarts.\n PanelChrome: Adds display mode to support transparent option.\n Plugins: Case-sensitive routes for standalone pages.\n Plugins: Prefer to use the data source UID when querying.\n SQLStore: Fix folder migration for MySQL < 5.7.\n Search: Fix not being able to clear sort value.\n Tempo: Fix span name being dropped from the query.\n PanelChrome: Implement hover header.\n- Update to 9.3.7\n Alerting: Validate that tags are 100 characters or less.\n Expressions: Fixes the issue showing expressions editor.\n Logs: Fix stats not being updated when log results change.\n Plugins: Fix circular reference in customOptions leading\n to MarshalJSON errors.\n Time Series Panel: Fix legend text selection in Firefox.\n- Update to 9.3.6\n QueryEditorRow: Fixes issue loading query editor when\n data source variable selected.\n- Update to 9.3.4\n Prometheus: Add default editor configuration.\n TextPanel: Refactor to functional component.\n Alerting: Fix webhook to use correct key for decrypting token.\n Alerting: Set error annotation on EvaluationError regardless of\n underlying error type.\n Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen.\n Fix creating of span link with no tags.\n Elasticsearch: Fix failing requests when using SigV4.\n Elasticsearch: Fix toggle-settings are not shown correctly.\n Explore: Be sure time range key bindings are mounted after\n clear.\n Explore: Unsync time ranges when a pane is closed.\n Logs: Lines with long words do not break properly.\n Loki: Fix misaligned derived fields settings.\n Query Builder: Fix max width of input component to prevent\n overflows.\n Search: Auto focus input elements.\n Search: Fix empty folder message showing when by starred\n dashboards.\n Table Panel: Fix image of image cell overflowing table cell and\n cells ignoring text alignment setting when a data\n link is added.\n- Update to 9.3.2\n Graphite: Process multiple queries to Graphite plugin.\n API: Fix delete user failure due to quota not enabled.\n Accessibility: Improved keyboard accessibility in BarGauge.\n Accessibility: Improved keyboard accessibility in BigValue.\n Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in\n quota check.\n AzureMonitor: Automate location retrieval.\n AzureMonitor: Fix bad request when setting dimensions.\n BarChart: Fix value mappings.\n Build: Streamline and sync dockerfiles.\n Build: Unified dockerfile for all builds.\n CloudWatch: Fix - make sure dimensions are propagated to alert\n query editor.\n Cloudwatch: Fix deeplink with default region.\n Command Palette: Fix not being able to type if triggered\n whilst another modal is open.\n Command Palette: Maintain page state when changing theme.\n Dashboards: Fix 'Make Editable' button not working in\n Dashboard Settings.\n Dashboards: Show error when data source is missing.\n Datasource: Fix - apply default query also to queries in new\n panels.\n Dropdown: Menu now closes correctly when selecting\n options on touch devices.\n Influx: Query segment menus now position correctly near\n the bottom of the screen.\n Login: Fix failure to login a new user via an external\n provider if quota are enabled.\n Loki/Prometheus: Fix wrong queries executed in split view.\n Loki: Fix wrongly escaped label values when using LabelFilter.\n Navigation: Prevent app crash when importing a dashboard with a\n uid of `home`.\n Panel Edit: Fix data links edit icons being off screen when\n provided title is too long.\n Prometheus: Fix exemplar fill color to match series color in\n time series.\n Prometheus: Fix exemplars not respecting corresponding series\n display status.\n StateTimeline: Fix negative infinity legend/tooltip from\n thresholds.\n Table: Fixes row border style not showing and colored\n rows blending together.\n Tempo: Fix TraceQL autocomplete issues.\n TimePicker: Prevent TimePicker overflowing viewport on small\n screens.\n TimeRangePicker: Fix recently ranges only not showing all recent\n ranges.\n TimeZonePicker: Scroll menu correctly when using keyboard\n controls.\n- Update to 9.3.1\n Connections: Update 'Your connections/Data sources' page.\n Accessibility: Increase badge constrast to be WCAG AA compliant.\n- Update to 9.3.0\n Alerting: Enable interpolation for notification policies in file\n provisioning.\n Azure Monitor Logs: Avoid warning when the response is empty.\n Azure Monitor: Add support to customized routes.\n Canvas: Add icon value mapping.\n CloudWatch: Cross-account querying support.\n Docs: Update `merge-pull-request.md` regarding backport\n policies.\n GaugePanel: Setting the neutral-point of a gauge.\n Geomap: Improve location editor.\n Internationalization: Enable internationalization by default.\n Logs: Add `Download logs` button to log log-browser.\n Loki: Add `gzip` compression to resource calls.\n Loki: Add improvements to loki label browser.\n Loki: Make label browser accessible in query builder.\n Loki: Remove raw query toggle.\n Middleware: Add CSP Report Only support.\n Navigation: Prevent viewer role accessing dashboard\n creation, import and folder creation.\n OAuth: Refactor OAuth parameters handling to support\n obtaining refresh tokens for Google OAuth.\n Oauth: Display friendly error message when\n role_attribute_strict=true and no valid role found.\n Preferences: Add confirmation modal when saving org preferences.\n PublicDashboards: Orphaned public dashboard deletion script\n added.\n Query Editor: Hide overflow for long query names.\n Solo Panel: Configurable timezone.\n TablePanel: Add support for Count calculation per column\n or per entire dataset.\n Tempo: Send the correct start time when making a TraceQL query.\n Various Panels: Remove beta label from Bar Chart, Candlestick,\n Histogram, State Timeline, & Status History\n Panels.\n Access Control: Clear user's permission cache after resource\n creation.\n Accessibility: Improve keyboard accessibility in\n `AnnoListPanel`.\n Accessibility: Improve keyboard accessibility in `Collapse`.\n `GettingStarted` panel.\n Accessibility: Improve keyboard accessibility of `FilterPill`.\n Admin: Fix broken links to image assets in email templates.\n Azure Monitor: Fix namespace selection for storageaccounts.\n Calcs: Fix difference percent in legend.\n DataLinks: Improve Data-Links AutoComplete Logic.\n Explore: Fix a11y issue with logs navigation buttons.\n Heatmap: Fix blurry text & rendering.\n Heatmap: Fix tooltip y range of top and bottom buckets in\n calculated heatmaps.\n Logs: Fix misalignment of LogRows.\n Navigation: Stop clearing search state when opening a\n result in a new tab.\n OptionsUI: SliderValueEditor does not get auto focused on\n slider change.\n PanelEdit: Fixes bug with not remembering panel options\n pane collapse/expand state.\n Quota: Fix failure in store due to missing scope parameters.\n Quota: Fix failure when checking session limits.\n StateTimeline: Prevent label text from overflowing state rects.\n Tempo: Fix search table duration unit.\n TraceView: Fix broken rendering when scrolling in Dashboard\n panel in Firefox.\n GrafanaUI: Add disabled option for menu items.\n- Update to 9.2.4\n Access Control: Add an endpoint for setting several managed\n resource permissions.\n Accessibility: Increase `Select` placeholder contrast to\n be WCAG AA compliant.\n Alerting: Append org ID to alert notification URLs.\n Alerting: Make the Grouped view the default one for Rules.\n Build: Remove unnecessary alpine package updates.\n Google Cloud Monitoring: Set frame interval to draw null values.\n Instrumentation: Expose when the binary was built as a gauge.\n Loki: Preserve `X-ID-Token` header.\n Search: Reduce requests in folder view.\n TimeSeries: More thorough detection of negative values for\n auto-stacking direction.\n Alerting: Attempt to preserve UID from migrated legacy channel.\n Alerting: Fix response is not returned for invalid Duration in\n Provisioning API.\n Alerting: Fix screenshot is not taken for stale series.\n Auth: Fix admins not seeing pending invites.\n MSSQL/Postgres: Fix visual query editor filter disappearing.\n Tempo: Fix dropdown issue on tag field focus.\n Timeseries: Fix null pointer when matching fill below to field.\n Toolkit: Fix Webpack less-loader config.\n- Update to 9.2.3\n Docs: Add information about DB version support to upgrade guide.\n Footer: Update footer release notes link to Github changelog.\n Prometheus: Do not drop errors in streaming parser.\n Prometheus: Flavor/version configuration.\n Prometheus: Provide label values match parameter API when\n supported prometheus instance is configured.\n Security: Upgrade x/text to version unaffected by\n CVE-2022-32149.\n Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn't work.\n Live: Explicitly reply with http 200.\n Prometheus: Fix builder operation mode changing\n multiselect to single select behaviour.\n Security: Fix vulnerabilities in webpack loader-utils.\n- Update to 9.2.2\n Alerting: Add support for wecom apiapp.\n Canvas: Improve resource picker initialization.\n Canvas: Improve text element readability.\n CloudWatch: Make sure adoption tracking is done on valid,\n migrated queries.\n Dashboard: Alerts user to incorrect tag format for JSON import.\n MSSQL: Support tables from all schemas.\n Opentsdb: Allow template variables for filter keys.\n QueryEditor: Revert components from grafana-ui.\n Browse: Fix General folder not showing in FolderPicker.\n Elasticsearch: Fix calculation of trimEdges in alert mode.\n Elasticsearch: Fix trimEdges delete logic in alert mode.\n GoogleOAuth: Unlock User Admin UI.\n LogContext: Fix wrong color of `show context` icon in light\n theme.\n Loki: Fix adding of adhoc filters to stream selector when query\n with empty stream selector.\n Loki: Fix double stringified log-lines when copied via Copy\n button.\n Loki: Fix explain section about $\\_\\_interval variable.\n Loki: Remove already selected options from next label filter\n options in builder.\n NodeGraph: Fix rendering issues when values of arc are over 1.\n PublicDashboards: Fix hidden queries execution.\n Tempo: Fix Node Graph visualization type in dashboard.\n TimeSeries: Fix stacking when first value is negative zero.\n TimeseriesPanel: Fix variables in data links.\n User: Fix externalUserId not being populated.\n We added some components a bit too early to @grafana/ui in 9.2\n so we are moving them back to @grafana/experimental. If you\n used any of these components\n AccessoryButton\n EditorFieldGroup\n EditorHeader\n EditorField\n EditorRow\n EditorList\n EditorRows\n EditorSwitch\n FlexItem\n Stack\n InlineSelect\n InputGroup\n Space\n Please use them from grafana/experimental from now on.\n- Update to 9.2.1\n Alerting: Improve notification policies created during\n migration.\n AzureAD: Add option to force fetch the groups from the\n Graph API.\n Docs: Note end of release notes publication.\n Inspect: Handle JSON tab crash when the provided object\n is too big to stringify.\n TablePanel: Footer now updates values on column filtering.\n Alerting: Fix email image embedding on Windows.\n Alerting: Fix mathexp.NoData for ConditionsCmd.\n Legacy Alerting: Fix duration calculation when testing a rule.\n Loki: Propagate additional headers from Grafana to Loki\n when querying data.\n Search: Sort alphabetically in the folder view, increase\n the limit of the folder search from 50 to 1000.\n TablePanel: Fix last table column to be centered.\n Grafana UI: Export prop types for queryfield, modal and field\n components.\n Toolkit: Fix `Cannot use import statement outside...` error in\n tests.\n- Update to 9.2.0\n Alerting: Add Notification error feedback on contact points\n view.\n Alerting: Allow created by to be manually set when\n there's no creator for silences.\n Alerting: Expose info about notification delivery errors\n in a new /receivers endpoint.\n Alerting: Update imported prometheus alertmanager version.\n Alerting: Write and Delete multiple alert instances.\n Core: Implement aria attributes for query rows, improve a11y.\n DevEnv: Adds docker block for clickhouse.\n Docker: removes unneccesary use of edge repo.\n Explore: Revert split pane resize feature.\n Frontend: Make local storage items propagate to different tabs\n immediately.\n PublicDashboards: Allow disabling an existent public dashboard\n if it.\n QueryEditorRow: Only pass error to query editor if panel\n is not in a loading state.\n XYChart: Beta release.\n Alerting: Start ticker only when scheduler starts.\n Alerting: Fix pq: missing FROM-clause for table 'a'.\n AzureMonitor: Correctly update subscriptions value in ARG\n editor.\n Chore: Regenerate swagger specification and fix validation\n failures.\n Correlations: Only return correlation for which both\n source and target datasources exist.\n Explore: Prevent panes from disappearing when resizing\n window in split view.\n Links: Fix opening links from different orgs on the same tab.\n LogContext: Fix scroll position in upper context group.\n Logs: Show copy button independently from context.\n Loki/Prometheus: Fix adding of ad hoc filters when\n jumping from dashboard to explore.\n Loki: Add support for range aggregations with by grouping.\n Loki: Fix label-value escaping in context query.\n Loki: Fix redundant escaping in adhoc filter with regex match.\n PanelEdit: Fixes resize pane border and spacing issues.\n RBAC: Redirect to /login when forceLogin is set.\n Security: Fix CVE-2022-27664.\n StateTimeline: Fix tooltip showing erroneously in shared\n crosshair dashboards.\n Tempo: Fix unexpected trimming of leading zeroes in traceID.\n Tracing: Fix bug where errors are not reported to OpenTelemetry.\n- Update to 9.1.8\n Alerting: Fix evaluation interval validation.\n Alerting: Fix migration to create rules with group index 1.\n Alerting: Fix migration to not add label 'alertname'.\n Azure Monitor: Fix empty Logs response for Alerting.\n Azure Monitor: Fix subscription selector when changing data\n sources.\n Google Cloud Monitoring: Fix bucket bound for distributions.\n- Update to 9.1.7\n CloudWatch: Add missing AWS/Prometheus metrics.\n Explore: Add feature tracking events.\n Graphite: Add error information to graphite queries tracing.\n Prometheus: Restore FromAlert header.\n Search: Add search index configuration options.\n Thresholds: Add option for dashed line style.\n Alerting: Fix default query's data source when no default\n datasource specified.\n Alerting: Fix mathexp.NoData cannot be reduced.\n Alerting: Skip unsupported file types on provisioning.\n AzureMonitor: Ensure resourceURI template variable is migrated.\n Dashboard: Fix plugin dashboard save as button.\n Docs: Fix decimals: auto docs for panel edit.\n Fix: RBAC handle `error no resolver` found.\n LibraryPanelSearch: Refactor and fix hyphen issue.\n Live: Fix live streaming with `live-service-web-worker` feature\n flag enabled.\n QueryField: Fix wrong cursor position on autocomplete.\n- Update to 9.1.6\n DataSource: Adding possibility to hide queries from the\n inspector.\n Inspect: Hide Actions tab when it is empty.\n PanelMenu: Remove hide legend action as it was showing on\n all panel types.\n Provisioning Contact points: Support disableResolveMessage via\n YAML.\n PublicDashboards: Support subpaths when generating pubdash url.\n Alerting: Fix legacy migration crash when rule name is too long.\n Alerting: Fix send resolved notifications.\n Azure Monitor: Fix migration issue with MetricDefinitionsQuery\n template variable query types.\n Browse: Hide dashboard actions if user does not have enough\n permission.\n ElasticSearch: Fix dispatching queries at a wrong time.\n Panel: Disable legends when showLegend is false prior to\n schema v37.\n Prometheus: Fix metadata requests for browser access mode.\n Search: Avoid requesting all dashboards when in Folder View.\n TablePanel/StatPanel: Fix values not being visible when\n background transparent.\n- Update to 9.1.5\n Alerting: Sanitize invalid label/annotation names for external\n alertmanagers.\n Alerting: Telegram: Truncate long messages to avoid send error.\n DisplayProcessor: Handle reverse-ordered data when auto-showing\n millis.\n Heatmap: Add option to reverse color scheme.\n PluginLoader: Alias slate-react as @grafana/slate-react.\n Search: Add substring matcher, to bring back the old\n dashboard search behavior.\n Traces: More visible span colors.\n Alerting: Fix incorrect propagation of org ID and other\n fields in rule provisioning endpoints.\n Alerting: Resetting the notification policy tree to the default\n policy will also restore default contact points.\n AzureMonitor: Fix custom namespaces.\n AzureMonitor: Fix issue where custom metric namespaces\n are not included in the metric namespace list.\n CloudWatch: Fix display name of metric and namespace.\n Cloudwatch: Fix annotation query serialization issue.\n Dashboard: Fix issue where unsaved changes warning would appear\n even after save, and not being able to change library\n panels.\n Dashboard: Hide overflow content for single left pane.\n Loki: Fix a bug where adding adhoc filters was not possible.\n- Update to 9.1.4\n GrafanaUI: Fixes Chrome issue for various query fields.\n- Update to 9.1.3\n API: Do not expose user input in datasource error responses.\n Library Panel: Allow to delete them when deprecated.\n Plugins Catalog: Allow to filter plugins using special\n characters.\n Alerting: Fix UI bug when setting custom notification\n policy group by.\n AppRootPage: Fix issue navigating between two app plugin pages.\n Correlations: Use correct fallback handlers.\n RBAC: Fix deleting empty snapshots.\n LibraryElements: Fix inability to delete library panels\n under MySQL.\n Metrics: fix `grafana_database_conn_*` metrics, and add\n new `go_sql_stats_*` metrics as eventual replacement.\n TestData DB: Fix node graph not showing when the `Data type`\n field is set to `random`.\n * Deprecations\n The `grafana_database_conn_*` metrics are deprecated, and will\n be removed in a future version of Grafana. Use the\n `go_sql_stats_*` metrics instead.\n- Update to 9.1.2\n AdHoc variable: Correctly preselect datasource when provisioning.\n AzureMonitor: Added ARG query function for template variables.\n Dashboards: Persist details message when navigating through\n dashboard save drawer's tabs.\n Dashboards: Correctly migrate mixed data source targets.\n Elasticsearch: Use millisecond intervals for alerting.\n Elasticsearch: Use millisecond intervals in frontend.\n Geomap: Local color range.\n Plugins Catalog: Use appSubUrl to generate plugins catalog urls.\n Rendering: Add support for renderer token.\n Alerting: Fix saving of screenshots uploaded with a signed url.\n AngularPanels: Fixing changing angular panel options not taking\n having affect when coming back from panel edit.\n Explore: Improve a11y of query row collapse button.\n Geomap: Fix tooltip display.\n QueryEditorRow: Filter data on mount.\n Search: Show all dashboards in the folder view.\n Tracing: Fix the event attributes in opentelemetry tracing.\n GrafanaUI: Fix styles for invalid selects & DataSourcePicker.\n- Update to 9.1.1\n Cloud Monitoring: Support SLO burn rate.\n Schema: Restore 'hidden' in LegendDisplayMode.\n Timeseries: Revert the timezone(s) property name change back to\n singular.\n Alerting: Fix links in Microsoft Teams notifications.\n Alerting: Fix notifications for Microsoft Teams.\n Alerting: Fix width of Adaptive Cards in Teams notifications.\n ColorPickerInput: Fix popover in disabled state.\n Decimals: Fixes auto decimals to behave the same for\n positive and negative values.\n Loki: Fix unique log row id generation.\n Plugins: Fix file extension in development authentication guide.\n TimeSeries: Fix jumping legend issue.\n TimeSeries: Fix memory leak on viz re-init caused by\n KeyboardPlugin.\n TimePicker: Fixes relative timerange of less than a day not\n displaying.\n GrafanaUI: Fixes ClipboardButton to always keep multi line\n content.\n- Update to 9.1.0\n API: Allow creating teams with a user defined identifier.\n Alerting: Adds interval and For to alert rule details.\n Alerting: Extend PUT rule-group route to write the entire\n rule group rather than top-level fields only.\n Alerting: Use Adaptive Cards in Teams notifications.\n Azure Monitor: Add Network Insights Dashboard.\n Chore: Improve logging of unrecoverable errors.\n Correlations: Add UpdateCorrelation HTTP API.\n Dashboard: Reverted the changes of hiding multi-select\n and all variable in the datasource picker.\n Geomap: Add alpha day/night layer.\n Geomap: Add measuring tools.\n GrafanaUI: Add success state to ClipboardButton.\n Heatmap: Replace the heatmap panel with new implementation.\n KVStore: Allow empty value in kv_store.\n Prometheus: Promote Azure auth flag to configuration.\n Search: Display only dashboards in General folder of\n Search Folder View.\n Status history/State timeline: Support datalinks.\n Transform: Add a limit transform.\n Transformations: Add standard deviation and variance reducers.\n API: Fix snapshot responses.\n Access Control: Fix permission error during dashboard\n creation flow.\n Access Control: Set permissions for Grafana's test data source.\n Alerting: Fix migration failure.\n BarGauge: Show empty bar when value, minValue and\n maxValue are all equal.\n Dashboard: Fix color of bold and italics text in panel\n description tooltip.\n Loki: Fix passing of query with defaults to code mode.\n Loki: Fix producing correct log volume query for query\n with comments.\n Loki: Fix showing of unusable labels field in detected fields.\n Tracing: Fix OpenTelemetry Jaeger context propagation.\n Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled.\n Plugins: Only pass `rootUrls` field in request when not empty.\n Alert notifications to Microsoft Teams now use Adaptive Cards\n instead of Office 365 Connector Cards.\n Starting at 9.1.0, existing heatmap panels will start using a\n new implementation. This can be disabled by setting the\n `useLegacyHeatmapPanel` feature flag to true. It can be\n tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n The most notable changes are:\n Significantly improved rendering performance\n When calculating heatmaps, the buckets are now placed on\n reasonable borders (1m, 5m, 30s etc)\n Round cells are no longer supported\n- Update to 9.0.9\n AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062.\n- Update to 9.0.8\n Alerting: Hide 'no rules' message when we are fetching\n from data sources.\n Alerting: AlertingProxy to elevate permissions for\n request forwarded to data proxy when RBAC enabled.\n- Update to 9.0.7\n CloudMonitoring: Remove link setting for SLO queries.\n GrafanaUI: Render PageToolbar's leftItems regardless of\n title's presence.\n- Update to 9.0.6\n Access Control: Allow org admins to invite new users to\n their organization.\n Grafana/toolkit: Fix incorrect image and font generation\n for plugin builds.\n Prometheus: Fix adding of multiple values for regex operator.\n UI/Card: Fix card items always having pointer cursor.\n- Update to 9.0.5\n Access control: Show dashboard settings to users who can\n edit dashboard.\n Alerting: Allow the webhook notifier to support a custom\n Authorization header.\n Plugins: Add signature wildcard globbing for dedicated\n private plugin type.\n Prometheus: Don't show errors from unsuccessful API\n checks like rules or exemplar checks.\n Access control: Allow organisation admins to add existing\n users to org.\n Alerting: Fix alert panel instance-based rules filtering.\n Apps: Fixes navigation between different app plugin pages.\n Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue\n with secret keys.\n Loki: Fix `show context` not working in some occasions.\n RBAC: Fix permissions on dashboards and folders created\n by anonymous users.\n- Update to 9.0.4\n Browse/Search: Make browser back work properly when\n visiting Browse or search.\n Logs: Improve getLogRowContext API.\n Loki: Improve handling of empty responses.\n Plugins: Always validate root URL if specified in\n signature manfiest.\n Preferences: Get home dashboard from teams.\n SQLStore: Support Upserting multiple rows.\n Traces: Add more template variables in Tempo & Zipkin.\n Traces: Remove serviceMap feature flag.\n Access Control: Fix missing folder permissions.\n Access control: Fix org user removal for OSS users.\n Alerting: Fix Slack notifications.\n Alerting: Preserve new-lines from custom email templates\n in rendered email.\n Log: Fix text logging for unsupported types.\n Loki: Fix incorrect TopK value type in query builder.\n- Update to 9.0.3\n Access Control: Allow dashboard admins to query org users.\n Alerting: Add method to provisioning API for obtaining a\n group and its rules.\n Alerting: Allow filtering of contact points by name.\n Alerting: Disable /api/admin/pause-all-alerts with\n Unified Alerting.\n Annotations: Use point marker for short time range annotations.\n AzureMonitor: Update UI to experimental package.\n AzureMonitor: Update resource and namespace metadata.\n CloudWatch: Remove simplejson in favor of 'encoding/json'.\n DashboardRow: Collapse shortcut prevent to move the\n collapsed rows.\n Navigation: Highlight active nav item when Grafana is\n served from subpath.\n Plugins: InfluxDB datasource - set epoch query param\n value as 'ms'.\n Plugins: InfluxDB update time range query.\n StateTimeline: Try to sort time field.\n API: Do not validate/save legacy alerts when saving a\n dashboard if legacy alerting is disabled.\n Alerting: Add method to reset notification policy tree\n back to the default.\n Alerting: Fix Teams notifier not failing on 200 response\n with error.\n Alerting: Fix bug where state did not change between\n Alerting and Error.\n Alerting: Fix consistency errors in OpenAPI documentation.\n Alerting: Fix normalization of alert states for panel\n Alerting: Provisioning API respects global rule quota.\n CSRF: Fix additional headers option.\n Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities.\n Chore: Fix CVE-2020-7753.\n Chore: Fix CVE-2021-3807.\n Chore: Fix CVE-2021-3918.\n Chore: Fix CVE-2021-43138.\n Chore: Fix CVE-2022-0155.\n Dashboard: Fixes tooltip issue with TimePicker and Setting buttons.\n Dashboard: Prevent unnecessary scrollbar when viewing\n single panel.\n Logs: Fixed wrapping log lines from detected fields.\n Loki: Add missing operators in label filter expression.\n Loki: Fix error when changing operations with different parameters.\n Loki: Fix suggesting of correct operations in query builder.\n Plugins: InfluxDB variable interpolation fix for\n influxdbBackendMigration feature flag.\n SQLstore: Fix fetching an inexistent playlist.\n Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n Snapshots: Fix deleting external snapshots when using RBAC.\n Table: Fix scrollbar being hidden by pagination.\n Templating: Changing between variables with the same name\n now correctly triggers a dashboard refresh.\n Time series panel: Fix an issue with stacks being not complete\n due to the incorrect data frame length.\n- Update to 9.0.2\n Alerting: Add support for images in Pushover alerts.\n Alerting: Don't stop the migration when alert rule tags\n are invalid.\n Alerting: Skip the default data source if incompatible.\n AzureMonitor: Parse non-fatal errors for Logs.\n OAuth: Restore debug log behavior.\n Plugins: Improved handling of symlinks.\n Alerting: Code-gen parsing of URL parameters and fix\n related bugs.\n Annotations: Fix annotation autocomplete causing panels\n to crash.\n Barchart: Fix warning not showing.\n CloudWatch: Enable custom session duration in AWS plugin auth.\n Dashboards: Fixes issue with the initial panel layout\n counting as an unsaved change.\n Plugins: Use a Grafana specific SDK logger implementation\n for core plugins.\n Search: Fix pagination in the new search page.\n- Update to 9.0.1\n Alerting: Add support for image annotation in\n Alertmanager alerts.\n Alerting: Add support for images in SensuGo alerts.\n Alerting: Add support for images in Threema alerts.\n Alerting: Adds Mimir to Alertmanager data source implementation.\n Alerting: Invalid setting of enabled for unified alerting\n should return error.\n AzureMonitor: Clean namespace when changing the resource.\n AzureMonitor: Update supported namespaces and filter\n resources by the right type.\n CLI: Allow relative symlinks in zip archives when\n installing plugins.\n Dashboard: Don't show unsaved changes modal for automatic\n schema changes.\n Dashboard: Unsaved changes warning should not trigger\n when only pluginVersion has changed.\n Expression: Execute hidden expressions.\n Geomap: Support showing tooltip content on click (not\n just hover).\n Heatmap: Remove alpha flag from new heatmap panel.\n Instrumentation: Define handlers for requests that are\n not handled with named handlers.\n Log Panel: Improve log row hover contrast and visibility.\n Logs: Handle backend-mode errors in histogram.\n Loki: Do not show histogram for instant queries.\n Loki: Handle data source configs with path in the url.\n Loki: Handle invalid query type values.\n OAuth: Redirect to login if no oauth module is found or\n if module is not configured.\n OptionsUI: Move internal options editors out of @grafana/ui.\n Prometheus: Don't show undefined for step in collapsed\n options in query editor when value is 'auto'.\n Prometheus: Show query patterns in all editor modes for\n Prometheus and Loki.\n Tempo: Add link to Tempo Search with node service selected.\n Time Series Panel: Add Null Filling and 'No Value' Support.\n TimeSeries: Add an option to set legend width.\n Timeseries: Improve cursor Y sync behavior.\n Traces: Do not use red in span colors as this looks like\n an error.\n Alerting: Fix AM config overwrite when SQLite db is\n locked during sync.\n Alerting: Fix alert instances filtering for prom rules.\n Alerting: Fix alert rule page crashing when datasource\n contained URL unsafe characters.\n Alerting: Fix automatically select newly created folder option.\n Alerting: Fix removal of notification policy without\n labels matchers.\n CloudWatch: Allow hidden queries to be executed in case\n an ID is provided.\n Dashboard: Prevent non-repeating panels being dropped\n from repeated rows when collapsed/expanded.\n Dashboards: Fix folder picker not showing correct results\n when typing too fast.\n Datasource: Prevent panic when proxying for non-existing\n data source.\n Explore: Fix log context scroll to bottom.\n Explore: Revert 'Remove support for compact format URLs'.\n Expressions: Fixes dashboard schema migration issue that casued\n Expression datasource to be set on panel level.\n Formatting: Fixes valueFormats for a value of 0.\n GrafanaData: Fix week start for non-English browsers.\n LibraryPanel: Resizing a library panel to 6x3 no longer\n crashes the dashboard on startup.\n LogRow: Fix placement of icon.\n Loki: Fix bug in labels framing.\n Loki: Fix issues with using query patterns.\n Loki: Fix showing of duplicated label values in dropdown\n in query builder.\n MSSQL: Fix ParseFloat error.\n Panels: Fixes issue with showing 'Cannot visualize data'\n when query returned 0 rows.\n Playlists: Disable Create Playlist buttons for users with\n viewer role.\n Plugins: Fix typo in plugin data frames documentation.\n Prometheus: Fix body not being included in resource calls\n if they are POST.\n RolePicker: Fix submenu position on horizontal space overflow.\n Tracing: Fix trace links in traces panel.\n Support for compact Explore URLs is deprecated and will be\n removed in a future release. Until then, when navigating to\n Explore using the deprecated format the URLs are\n automatically converted. If you have existing links pointing\n to Explore update them using the format generated by Explore\n upon navigation. You can identify a compact URL by its\n format. Compact URLs have the left (and optionally right) url\n parameter as an array of strings, for example\n `&left=['now-1h','now'...]`. The standard explore URLs follow\n a key/value pattern, for example\n `&left={'datasource':'test'...}`. Please be sure to check\n your dashboards for any hardcoded links to Explore and update\n them to the standard URL pattern.\n- Update to 9.0.0\n API: Add GET /api/annotations/:annotationId endpoint.\n API: Add endpoint for updating a data source by its UID.\n AccessControl: Add enterprise only setting for rbac\n permission cache.\n AccessControl: Document basic roles changes and provisioning V2.\n AccessControl: Enable RBAC by default.\n AddDataSourceConfig: Remove deprecated checkHealth prop.\n Alerting: Add Image URLs to Microsoft Teams notifier.\n Alerting: Add RBAC actions and role for provisioning API routes.\n Alerting: Add Screenshot URLs to Pagerduty Notifier.\n Alerting: Add a 'Reason' to Alert Instances to show\n underlying cause of state.\n Alerting: Add a general screenshot service and\n alerting-specific image service.\n Alerting: Add image url or file attachment to email\n notifications.\n Alerting: Add image_urls to OpsGenie notification details.\n Alerting: Add notification policy flow chart.\n Alerting: Attach image URL to alerts in Webhook notifier format.\n Alerting: Attach image URLs or upload files to Discord\n Alerting: Attach image URLs to Google Chat notifications.\n Alerting: Attach screenshot data to Unified Alerting\n Alerting: Create folder for alerting when start from the\n scratch.\n Alerting: Modify alertmanager endpoints for proxying\n using the datasource UID.\n Alerting: Modify endpoint for testing a datasource rule\n using the UID.\n Alerting: Modify prometheus endpoints for proxying using\n the datasource UID.\n Alerting: State Manager takes screenshots.\n Alerting: Use UID scope for folders authorization.\n Alerting: modify ruler endpoints for proxying using the\n datasource UID.\n Angular: Adds back two angular directives that are still\n used by remaining angular bits and plugins.\n Azure Monitor: Add Resource Picker to Metrics Queries.\n Azure Monitor: Add search feature to resource picker.\n AzureMonitor: Add support for selecting multiple options when\n using the equals and not equals dimension filters.\n AzureMonitor: Remove deprecated code.\n Build: Change names to PascalCase to match.\n Chore: Remove deprecated DataSourceAPI methods.\n Chore: Upgrade typescript to 4.6.4.\n Cloud Monitoring: Use new annotation API.\n CloudMonitoring: Allow to set a custom value or disable\n graph_period.\n CloudWatch: Add generic filter component to variable editor.\n CloudWatch: Added missing AWS/AppRunner metrics.\n CloudWatch: Enable support for dynamic labels with\n migrated alias patterns.\n Cloudwatch: Pass label in deep link.\n Cloudwatch: Use new annotation API.\n Dashboard: Validate dashboards against schema on save.\n DashboardPickerByID: Add option to exclude dashboards.\n DashboardPickerById: Add optionLabel prop.\n Dashboards: Display values of 0 with the configured\n decimal places.\n Data: Remove deprecated types and functions from valueMappings.\n Elasticsearch: Remove browser access mode.\n Elasticsearch: Remove support for versions after their\n end of the life (<7.10.0).\n Encryption: Add support for multiple data keys per day.\n Encryption: Enable envelope encryption by default.\n Explore: Remove support for legacy, compact format URLs.\n Explore: Skip Angular error handling when Angular support\n is disabled.\n Explore: simplify support for multiple query editors.\n FeatureToggles: Support changing feature toggles with URL\n parameters.\n FileUpload: Make component accessible by keyboard navigation.\n Formatting: Make SI number formats more robust.\n Graph: Deprecate Graph (old) and make it no longer a\n visualization option for new panels.\n IconButton: IconButtons are now correctly aligned in Safari.\n Logger: Enable new logging format by default.\n Loki: Add more query patterns.\n Loki: Enable new visual query builder by default.\n Loki: use the same dataframe-format for both live and\n normal queries.\n OAuth: Make allowed email domain case insensitive.\n Panels: Use the No value option when showing the no data\n message.\n Plugins: Remove plugin list panel.\n Query History: Enable new query history by default.\n QueryEditorRow: Show query errors next to query in a\n consistent way across Grafana.\n SAML: Implement Name Templates for\n assertion_attribute_name option.\n Service accounts: Do not display service accounts\n assigned to team.\n Settings: Use Grafana Azure SDK to pass Azure env vars\n for external plugins.\n Shortcuts: Add shortcut to show shortcuts to the list of\n shortcuts.\n Traces Panel: Add new Traces Panel visualization.\n Traces: Filter by service/span name and operation in\n Tempo and Jaeger.\n Transformations: Allow more complex regex expressions\n in `Rename by regex`.\n grafana/ui: Add default type='button' to <Button>.\n Alerting: Fix database unavailable removes rules from scheduler.\n AzureMonitor: Fix auto-selection of time-grain for metrics.\n DataSources: Fixes issue with expressions not being queried.\n GraphNG: Fix thresholds by color not following data update.\n Jaeger: Update operations dropdown.\n Login: Fix mismatching label on auth_module in user list.\n Playlists: Save button now correctly creates a new playlist.\n RBAC: Fix migrations running in the wrong order causing\n inheritance problem in enterprise.\n ServiceAccounts: Add identifiable token prefix to service\n account tokens.\n Traces: Fix missing CopyButton on KeyValueTables and\n overlapping of panels.\n `setExploreQueryField`, `setExploreMetricsQueryField` and\n `setExploreLogsQueryField` are now deprecated and will be\n removed in a future release. If you need to set a different\n query editor for Explore, conditionally render based on\n `props.app` in your regular query editor.\n Chore: Remove react-testing-lib from bundles.\n Select: Portal menu by default.\n The `@grafana/ui` package helper function\n `selectOptionInTest` used in frontend tests has been removed\n as it caused testing libraries to be bundled in the\n production code of Grafana. If you were using this helper\n function in your tests please update your code accordingly:\n ```js\n // before\n import { selectOptionInTest } from '@grafana/ui';\n // ...test usage\n await selectOptionInTest(selectEl, 'Option 2');\n // after\n import { select } from 'react-select-event';\n await select(selectEl, 'Option 2',\n { container: document.body });\n ```\n Removed deprecated `checkHealth` prop from the `@grafana/e2e`\n `addDataSource` config. Previously this value defaulted to\n `false`, and has not been used in end-to-end tests since\n Grafana 8.0.3.\n Removes the deprecated `LegacyBaseMap`, `LegacyValueMapping`,\n `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. Migration is as\n follows:\n | Old | New |\n | -------------------- | ----------------------- |\n | `LegacyBaseMap` | `MappingType` |\n | `LegacyValueMapping` | `ValueMapping` |\n | `LegacyValueMap` | `ValueMap` |\n | `LegacyRangeMap` | `RangeMap` |\n | `getMappedValue` | `getValueMappingResult` |\n This change fixes a bug in Grafana where intermittent failure\n of database, network between Grafana and the database, or\n error in querying the database would cause all alert rules to\n be unscheduled in Grafana. Following this change scheduled\n alert rules are not updated unless the query is successful.\n The `get_alert_rules_duration_seconds` metric has been\n renamed to `schedule_query_alert_rules_duration_seconds`.\n Any secret (data sources credential, alert manager\n credential, etc, etc) created or modified with Grafana v9.0\n won't be decryptable from any previous version (by default)\n because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified\n with previous versions will still be decryptable by Grafana\n v9.0.\n If required, although generally discouraged, the\n `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n In case of need to rollback to an earlier version of Grafana\n (i.e. Grafana v8.x) for any reason, after being created or\n modified any secret with Grafana v9.0, the\n `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit\n unstable, from `8.5.x` stable).\n As a final attempt to deal with issues related with the\n aforementioned situations, the `grafana-cli admin\n secrets-migration rollback` command has been designed to\n move back all the Grafana secrets encrypted with envelope\n encryption to legacy encryption. So, after running that\n command it should be safe to disable envelope encryption\n and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above,\n backing up the Grafana database before updating could be a\n good idea to prevent disasters (although the risk of getting\n some secrets corrupted only applies to those updates/created\n with after updating to Grafana v9.0).\n According to the dynamic labels documentation, you can use up\n to five dynamic values per label. There’s currently no such\n restriction in the alias pattern system, so if more than 5\n patterns are being used the GetMetricData API will return an\n error.\n Dynamic labels only allow \\${LABEL} to be used once per\n query. There’s no such restriction in the alias pattern\n system, so in case more than 1 is being used the\n GetMetricData API will return an error.\n When no alias is provided by the user, Grafana will no longer\n fallback with custom rules for naming the legend.\n In case a search expression is being used and no data is\n returned, Grafana will no longer expand dimension values, for\n instance when using a multi-valued template variable or star\n wildcard `*` in the dimension value field.\n Time series might be displayed in a different order. Using\n for example the dynamic label `${PROP('MetricName')}`, might\n have the consequence that the time series are returned in a\n different order compared to when the alias pattern\n `{{metric}}` is used\n In Elasticsearch, browser access mode was deprecated in\n grafana 7.4.0 and removed in 9.0.0. If you used this mode,\n please switch to server access mode on the datasource\n configuration page.\n Environment variables passed from Grafana to external Azure\n plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to\n `GFAZPL_MANAGED_IDENTITY_ENABLED`\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to\n `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`\n There are no known plugins which were relying on these\n variables. Moving forward plugins should read Azure settings\n only via Grafana Azure SDK which properly handles old and new\n environment variables.\n Removes support for for ElasticSearch versions after their\n end-of-life, currently versions < 7.10.0. To continue to use\n ElasticSearch data source, upgrade ElasticSearch to version\n 7.10.0+.\n Application Insights and Insight Analytics queries in Azure\n Monitor were deprecated in Grafana 8.0 and finally removed in\n 9.0. Deprecated queries will no longer be executed.\n grafana/ui: Button now specifies a default type='button'\n The `Button` component provided by @grafana/ui now specifies\n a default `type='button'` when no type is provided.\n In previous versions, if the attribute was not specified for\n buttons associated with a `<form>` the default value was\n `submit` per the specification. You can preserve the old\n behavior by explicitly setting the type attribute:\n `<Button type='submit' />`\n The `Rename by regex` transformation has been improved to\n allow global patterns of the form `/<stringToReplace>/g`.\n Depending on the regex match used, this may cause some\n transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the\n `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n `<Select />` menus will now portal to the document body by\n default. This is to give more consistent behaviour when\n positioning and overlaying. If you were setting\n `menuShouldPortal={true}` before you can safely remove that\n prop and behaviour will be the same. If you weren't\n explicitly setting that prop, there should be no visible\n changes in behaviour but your tests may need updating. If you\n were setting `menuShouldPortal={false}` this will continue to\n prevent the menu from portalling.\n Grafana alerting endpoint prefixed with `api/v1/rule/test`\n that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of\n the data source numeric identifier.\n Grafana alerting endpoints prefixed with `api/prometheus/`\n that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n source numeric identifier.\n Grafana alerting endpoints prefixed with `api/ruler/` that\n proxy requests to a Cortex/Loki data source now expect the\n data source UID as a path parameter instead of the data\n Grafana alerting endpoints prefixed with `api/alertmanager/`\n that proxy requests to an Alertmanager now expect the data\n source UID as a path parameter instead of the data source\n numeric identifier.\n The format of log messages have been updated, `lvl` is now\n `level` and `eror`and `dbug` has been replaced with `error`\n and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the\n new log format by enabling the feature toggle `oldlog`.\n This option will be removed in a future minor release.\n In the Loki data source, the dataframe format used to\n represent Loki logs-data has been changed to a more efficient\n format. The query-result is represented by a single dataframe\n with a 'labels' column, instead of the separate dataframes\n for every labels-value. When displaying such data in explore,\n or in a logs-panel in the dashboard will continue to work\n without changes, but if the data was loaded into a different\n dashboard-panel, or Transforms were used, adjustments may be\n necessary. For example, if you used the 'labels to fields'\n transformation with the logs data, please switch to the\n 'extract fields' transformation.\n- Update to version 8.5.22:\n * Fix XSS in Graphite functions tooltip\n (bsc#1209645, CVE-2023-1410)\n- Update to version 8.5.21:\n * Apply attribute sanitation to GeomapPanel\n (bsc#1208821, CVE-2023-0507)\n * Avoid storing XSS in TraceView panel\n (bsc#1208819, CVE-2023-0594)\n * Login: Fix panic when UpsertUser is called without ReqContext \n- Fix basic authentication bypass by updating the exporter toolkit\n to version 0.7.3 (bsc#1208065, CVE-2022-46146).\n- Require Go 1.19 or newer (bsc#1208293, CVE-2022-41723)\n- Update to version 8.5.20:\n * Security: SVG: Add dompurify preprocessor step\n (bsc#1207749, CVE-2022-23552)\n * Security: Snapshots: Fix originalUrl spoof security issue\n (bsc#1207750, CVE-2022-39324)\n * Security: Omit error from http response \n * Bug fix: Email and username trimming and invitation validation\n- Update to version 8.5.15 (jsc#PED-2617):\n * Security: Fix for privilege escalation\n (bsc#1205225, CVE-2022-39306)\n * Security: Omit error from http response when user does not\n exists (bsc#1205227, CVE-2022-39307)\n- Update to version 8.5.14:\n * Security: Fix do not forward login cookie in outgoing requests\n (bsc#1204303, CVE-2022-39201)\n * Security: Make proxy endpoints not leak sensitive HTTP headers\n (bsc#1204305, CVE-2022-31130)\n * Security: Fix plugin signature bypass (bsc#1204302, CVE-2022-31123)\n * Security: Fix blocknig other users from signing in (bsc#1204304,\n CVE-2022-39229)\n- Update to version 8.5.13 (jsc#PED-2145):\n + Features and enhancements:\n * Plugins: Expose emotion/react to plugins to prevent load\n failures\n + Bug fix:\n * AuthNZ: Security fixes for (bsc#1203596, CVE-2022-36062) and\n (bsc#1203597, CVE-2022-35957)\n- Update to version 8.5.11:\n * Rendering: Add support for renderer token\n * Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled\n- Update to version 8.5.10\n + Bug fixes (8.5.10):\n * RBAC: Fix Anonymous Editors missing dashboard controls.\n #52649, @gamab\n + Bug fixes (8.5.9):\n * Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n #52238, @xlson\n + Bug fixes (8.5.6):\n * Dashboard: Fixes random scrolling on time range change.\n #50379, @torkelo\n * Security: Fixes minor code scanning security warnings in old\n vendored javascript libs. #50382, @torkelo\n + Features and enhancements (8.5.5):\n * Azure Monitor: Include datasource ref when interpolating\n variables. #49543, @kevinwcyu\n * CloudWatch: Add multi-value template variable support for log\n group names in logs query builder. #49737, @kevinwcyu\n * Cloudwatch: Add template variable query function for listing\n log groups. #50100, @yaelleC\n + Bug fixes (8.5.5):\n * Alerting: Do not overwrite existing alert rule condition.\n #49920, @gillesdemey\n * Alerting: Remove double quotes from matchers. #50044,\n @alexweav\n + Features and enhancements (8.5.4):\n * Alerting: Remove disabled flag for data source when migrating\n alerts. #48559, @yuri-tceretian\n * Alerting: Show notification tab of legacy alerting only to\n editor. #49624, @yuri-tceretian\n * Alerting: Update migration to migrate only alerts that belong\n to existing org\\dashboard. #49192, @yuri-tceretian\n * AzureMonitor: Do not quote variables when a custom 'All'\n variable option is used. #49428, @andresmgot\n * AzureMonitor: Update allowed namespaces. #48468,\n @jcolladokuri\n * CloudMonitor: Correctly encode default project response.\n #49510, @aangelisc\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics.\n #48798, @szymonpk\n * InfluxDB: Use backend for influxDB by default via feature\n toggle. #48453, @yesoreyeram\n * Legend: Use correct unit for percent and count calculations.\n #49004, @dprokop\n * LokI: use millisecond steps in Grafana 8.5.x. #48630, @gabor\n * Plugins: Introduce HTTP 207 Multi Status response to\n api/ds/query. #48550, @wbrowne\n * Transformations: Add an All Unique Values Reducer. #48653,\n @josiahg\n * Transformers: avoid error when the ExtractFields source field\n is missing. #49368, @wardbekker\n * [v8.5.x] Alerting: Update migration to migrate only alerts\n that belong to existing org\\dashboard. #49199, @grafanabot\n + Bug fixes (8.5.4):\n * Alerting: Allow disabling override timings for notification\n policies. #48648, @gillesdemey\n * Alerting: Allow serving images from custom url path. #49022,\n @gillesdemey\n * Alerting: Apply Custom Headers to datasource queries. #47860,\n @joeblubaugh\n * Alerting: Fix RBAC actions for notification policies. #49185,\n @yuri-tceretian\n * Alerting: Fix access to alerts for viewer with editor\n permissions when RBAC is disabled. #49270, @yuri-tceretian\n * Alerting: Fix anonymous access to alerting. #49203,\n * Alerting: correctly show all alerts in a folder. #48684,\n * AzureMonitor: Fixes metric definition for Azure Storage\n queue/file/blob/table resources. #49101, @aangelisc\n * Dashboard: Fix dashboard update permission check. #48746,\n @IevaVasiljeva\n * DashboardExport: Fix exporting and importing dashboards where\n query data source ended up as incorrect. #48410, @torkelo\n * FileUpload: clicking the Upload file button now opens their\n modal correctly. #48766, @ashharrison90\n * GrafanaUI: Fix color of links in error Tooltips in light\n theme. #49327, @joshhunt\n * LibraryPanels: Fix library panels not connecting properly in\n imported dashboards. #49161, @joshhunt\n * Loki: Improve unpack parser handling. #49074, @gabor\n * RolePicker: Fix menu position on smaller screens. #48429,\n @Clarity-89\n * TimeRange: Fixes updating time range from url and browser\n history. #48657, @torkelo\n * TimeSeries: Fix detection & rendering of sparse datapoints.\n #48841, @leeoniya\n * Timeseries: Fix outside range stale state. #49633, @ryantxu\n * Tooltip: Fix links not legible in Tooltips when using light\n theme. #48748, @joshhunt\n * Tooltip: Sort decimals using standard numeric compare.\n #49084, @dprokop\n * Transforms: Labels to fields, fix label picker layout.\n #49304, @torkelo\n * Variables: Fixes issue with data source variables not\n updating queries with variable. #49478, @torkelo\n * [v8.5.x] Alerting: Fix RBAC actions for notification policies\n (#49185). #49348, @yuri-tceretian\n * [v8.5.x] Alerting: Fix access to alerts for viewer with\n editor permissions when RBAC is disabled. #49427, @konrad147\n * [v8.5.x] Alerting: Fix anonymous access to alerting. #49268,\n + Breaking changes (8.5.4):\n For a data source query made via /api/ds/query:\n If the DatasourceQueryMultiStatus feature is enabled and\n The data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now 207\n Multi Status instead of 400 Bad gateway\n If the DatasourceQueryMultiStatus feature is not enabled and\n DataResponse, the resulting HTTP status code is 400 Bad\n Request (no breaking change)\n --> Issue #48550\n + Bug fixes (8.5.3):\n * Security: fixes CVE-2022-29170. #49240, @xlson\n + Features and enhancements (8.5.2):\n * Alerting: Add safeguard for migrations that might cause\n dataloss. #48526, @JohnnyQQQQ\n * AzureMonitor: Add support for not equals and startsWith\n operators when creating Azure Metrics dimension filters.\n #48077, @aangelisc\n * Elasticsearch: Add deprecation notice for < 7.10 versions.\n #48506, @ivanahuckova\n * Traces: Filter by service/span name and operation in Tempo\n and Jaeger. #48209, @joey-grafana\n + Bug fixes (8.5.2):\n * AzureAd Oauth: Fix strictMode to reject users without an\n assigned role. #48474, @kyschouv\n * CloudWatch: Fix variable query tag migration. #48587, @iwysiu\n * Plugins: Ensure catching all appropriate 4xx api/ds/query\n scenarios. #47565, @wbrowne\n + Bug fixes (8.5.1):\n * Azure Monitor: Fix space character encoding for metrics query\n link to Azure Portal. #48139, @kevinwcyu\n * CloudWatch: Prevent log groups from being removed on query\n change. #47994, @asimpson\n * Cloudwatch: Fix template variables in variable queries.\n #48140, @iwysiu\n * Explore: Prevent direct access to explore if disabled via\n feature toggle. #47714, @Elfo404\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Navigation: Prevent navbar briefly showing on login. #47968,\n @ashharrison90\n * Plugins Catalog: Fix styling of hyperlinks. #48196, @marefr\n * Table: Fix filter crashes table. #48258, @zoltanbedi\n * TimeSeries: Properly stack series with missing datapoints.\n #48321, @leeoniya\n + Features and enhancements (8.5.0):\n * Alerting: Add contact points provisioning API. #47197,\n @JohnnyQQQQ\n * Alerting: Add resolved count to notification title when both\n firing and resolved present. #46697, @JacobsonMT\n * Alerting: Alert rule should wait For duration when execution\n error state is Alerting. #47052, @grobinson-grafana\n * Alerting: Classic conditions can now display multiple values.\n #46971, @gotjosh\n * Alerting: Display query from grafana-managed alert rules on\n /api/v1/rules. #45969, @gotjosh\n * Alerting: Enhance support for arbitrary group names in\n managed alerts. #47785, @gillesdemey\n * Alerting: add field for custom slack endpoint. #45751,\n @nathanrodman\n * Azure Monitor : Adding json formatting of error messages in\n Panel Header Corner and Inspect Error Tab. #44877, @yaelleC\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights.\n #45187, @jcolladokuri\n * CloudWatch: Handle new error codes for MetricInsights.\n #47033, @Gabrielopesantos\n * Dashboards: show changes in save dialog. #46557, @ryantxu\n * DataSource: Default data source is no longer a persisted\n state but just the default data source for new panels.\n #45132, @torkelo\n * DataSourcePlugin API: Allow queries import when changing data\n source type. #47435, @dprokop\n * Explore: Remove return to panel button. #45018, @gelicia\n * Explore: allow users to save Explore state to a new panel in\n a new dashboard. #45148, @Elfo404\n * Instrumentation: Proxy status code correction and various\n improvements. #47473, @marefr\n * Logging: Introduce feature toggle to activate gokit/log\n format. #47336, @ying-jeanne\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint.\n #45238, @wbrowne\n * Plugins: Adding support for traceID field to accept\n variables. #45559, @vinisdl\n * PostgreSQL: __unixEpochGroup to support arithmetic expression\n as argument. #46764, @s0nik42\n * Profile/Help: Expose option to disable profile section and\n help menu. #46308, @cameronwaterman\n * Prometheus: Enable new visual query builder by default.\n #46634, @torkelo\n * SAML: Allow disabling of SAML signups. #47481, @mmandrus\n * SAML: Allow disabling of SAML signups. (Enterprise)\n * Table: New pagination option. #45732, @zoltanbedi\n * TablePanel: Add cell inspect option. #45620, @dprokop\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer.\n #45632, @Shachi16\n * Tempo: Download span references in data inspector. #47074,\n @connorlindsey\n * Tempo: Separate trace to logs and loki search datasource\n config. #46655, @connorlindsey\n * Trace View: Show number of child spans. #44393, @tharun208\n * Transformations: Support escaped characters in key-value pair\n parsing. #47901, @aangelisc\n + Bug fixes (8.5.0):\n * Azure Monitor: Bug Fix for incorrect variable cascading for\n template variables. #47478, @jcolladokuri\n * CloudWatch: List all metrics properly in SQL autocomplete.\n #45898, @sunker\n * CloudWatch: Run query on blur in logs query field. #47454,\n @fridgepoet\n * Dashboard: Template variables are now correctly persisted\n when clicking breadcrumb links. #46790, @ashharrison90\n * DashboardPage: Remember scroll position when coming back\n panel edit / view panel. #47639, @torkelo\n * Panel Edit: Options search now works correctly when a\n logarithmic scale option is set. #47927, @ashharrison90\n * Postgres: Return tables with hyphenated schemes. #45754,\n @zuchka\n * Table panel: Fix horizontal scrolling when pagination is\n enabled. #47776, @dprokop\n * Variables: Ensure variables in query params are correctly\n recognised. #47049, @ashharrison90\n * Variables: Fix crash when changing query variable datasource.\n #44957, @joshhunt\n * Visualizations: Stack negative-valued series downwards.\n #47373, @leeoniya\n + Breaking changes (8.5.0):\n For a proxied request, e.g. Grafana's datasource or plugin\n proxy: If the request is cancelled, e.g. from the browser/by\n the client, the HTTP status code is now 499 Client closed\n request instead of 502 Bad gateway If the request times out,\n e.g. takes longer time than allowed, the HTTP status code is\n now 504 Gateway timeout instead of 502 Bad gateway. Issue\n #47473 The change in behavior is that negative-valued series\n are now stacked downwards from 0 (in their own stacks), rather\n than downwards from the top of the positive stacks. We now\n automatically group stacks by Draw style, Line interpolation,\n and Bar alignment, making it impossible to stack bars on top of\n lines, or smooth lines on top of stepped lines. Issue #47373\n The meaning of the default data source has now changed from\n being a persisted property in a panel. Before when you selected\n the default data source for a panel and later changed the\n default data source to another data source it would change all\n panels who were configured to use the default data source. From\n now on the default data source is just the default for new\n panels and changing the default will not impact any currently\n saved dashboards. Issue #45132 The Tooltip component provided\n by @grafana/ui is no longer automatically interactive (that is\n you can hover onto it and click a link or select text). It will\n from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before\n set the new interactive property to true.\n + Deprecations (8.5.0):\n /api/tsdb/query API has been deprecated and will be removed in\n a future release. Use /api/ds/query instead. Issue #45238\n + Plugin development fixes & changes (8.5.0):\n * Card: Increase clickable area when meta items are present.\n #47935, @ashharrison90\n * Loki: Fix operator description propup from being shortened.\n #46575, @glintik\n * Tooltips: Make tooltips non interactive by default. #45053,\n @torkelo\n + Features and enhancements (8.4.7):\n * CloudWatch: Added missing MemoryDB Namespace metrics. #47290,\n @james-deee\n * Histogram Panel: Take decimal into consideration. #47330,\n @mdvictor\n * TimeSeries: Sort tooltip values based on raw values. #46738,\n @dprokop\n + Bug fixes (8.4.7):\n * API: Include userId, orgId, uname in request logging\n middleware. #47183, @marefr\n * Elasticsearch: Respect maxConcurrentShardRequests datasource\n setting. #47120, @alexandrst88\n + Features and enhancements (8.4.5):\n * Instrumentation: Make backend plugin metrics endpoints\n available with optional authentication. #46467, @marefr\n * Table panel: Show datalinks for cell display modes JSON View\n and Gauge derivates. #46020, @mdvictor\n + Bug fixes (8.4.5):\n * Azure Monitor: Small bug fixes for Resource Picker. #46665,\n @sarahzinger\n * Logger: Use specified format for file logger. #46970, @sakjur\n * Logs: Handle missing fields in dataframes better. #46963,\n @gabor\n * ManageDashboards: Fix error when deleting all dashboards from\n folder view. #46877, @joshhunt\n + Features and enhancements (8.4.4):\n * Loki: Add unpack to autocomplete suggestions (#44623).\n #46573, @glintik\n * Plugins: allow using both Function and Class components for\n app plugins. #46148, @leventebalogh\n * TimeSeries: Add migration for Graph panel's transform series\n override. #46577, @dprokop\n * TimeSeries: Preserve null/undefined values when performing\n negative y transform. #46584, @dprokop\n + Bug fixes (8.4.4):\n * CloudWatch: Use default http client from aws-sdk-go. #46370,\n @sunker\n * Dashboards: Fixes repeating by row and no refresh. #46565,\n * Gauge: Fixes blank viz when data link exists and orientation\n was horizontal. #46335, @torkelo\n * Search: sort results correctly when using postgres. #46466,\n @xlson\n * TagsInput: fix tags remove button accessibility issues.\n #46254, @Elfo404\n * TextPanel: Sanitize after markdown has been rendered to html.\n #46166, @ashharrison90\n + Features and enhancements (8.4.3):\n * Alerting: Grafana uses > instead of >= when checking the For\n duration. #46010\n * Alerting: Use expanded labels in dashboard annotations.\n #45726, @grobinson-grafana\n * Logs: Escape windows newline into single newline. #45771,\n @perosb\n + Bug fixes (8.4.3):\n * Alerting: Fix use of > instead of >= when checking the For\n duration. #46011, @grobinson-grafana\n * Azure Monitor: Fixes broken log queries that use workspace.\n #45820, @sunker\n * CloudWatch: Remove error message when using multi-valued\n template vars in region field. #45886, @sunker\n * Middleware: Fix IPv6 host parsing in CSRF check. #45911,\n @ying-jeanne\n + Plugin development fixes & changes (8.4.3):\n * ClipboardButton: Use a fallback when the Clipboard API is\n unavailable. #45831, @ashharrison90\n + Features and enhancements (8.4.2):\n * OAuth: Add setting to skip org assignment for external\n users. #34834, @baez90\n * Tracing: Add option to map tag names to log label names in\n trace to logs settings. #45178, @connorlindsey\n + Bug fixes (8.4.2):\n * Explore: Fix closing split pane when logs panel is\n used. #45602, @ifrost\n + Features and enhancements (8.4.1):\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and\n dimensions. #45515, @szymonpk\n * Configuration: Add ability to customize okta login button\n name and icon. #44079, @DanCech\n * Tempo: Switch out Select with AsyncSelect component to get\n loading state in Tempo Search. #45110, @CatPerry\n + Bug fixes (8.4.1):\n * Alerting: Fix migrations by making send_alerts_to field\n nullable. #45572, @santihernandezc\n + Features and enhancements (8.4.0):\n * API: Extract OpenAPI specification from source code using\n go-swagger. #40528, @papagian\n * AccessControl: Disable user remove and user update roles when\n they do not have the permissions. #43429, @Jguer\n * AccessControl: Provisioning for teams. #43767, @gamab\n * API: Add usage stats preview endpoint. #43899, @Jguer\n * Alerting: Move slow queries in the scheduler to another\n goroutine. #44423, @grobinson-grafana\n * Alerting: Use time.Ticker instead of alerting.Ticker in\n ngalert. #44395, @grobinson-grafana\n * Alerting: add custom grouping to Alert Panel. #44559,\n * Analytics: Add user id tracking to google analytics.\n #42763, @autoric\n * Angular: Add AngularJS plugin support deprecation plan to\n docs site. #45149, @torkelo\n * Auth: implement auto_sign_up for auth.jwt. #43502, @sakjur\n * Azure Monitor Logs: Order subscriptions in resource picker by\n name. #45228, @sunker\n * Azure monitor Logs: Optimize data fetching in resource\n picker. #44549, @sunker\n * AzureMonitor: Filter list of resources by resourceType.\n #43522, @andresmgot\n * BarChart: color by field, x time field, bar radius, label\n skipping. #43257, @leeoniya\n * Chore: Implement OpenTelemetry in Grafana. #42674, @idafurjes\n * Cloud Monitoring: Adds metric type to Metric drop down\n options. #43268, @tw1nk\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension.\n #43310, @ilyastoli\n * CloudWatch: Add Missing Elasticache Host-level metrics.\n #43455, @dhendo\n * CloudWatch: Add all ElastiCache Redis Metrics. #43336,\n @siavashs\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add syntax highlighting and autocomplete for\n 'Metric Search'. #43985, @sarahzinger\n * Explore: Support custom display label for exemplar links for\n Prometheus datasource. #42732, @JokerQueue\n * Hotkeys: Make time range absolute/permanent. #43802, @davkal\n * Playlists: Enable sharing direct links to playlists. #44161,\n * SQLStore: Prevent concurrent migrations. #44101, @papagian\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations.\n #43583, @kylebrandt\n * Setting: Support configuring feature toggles with bools\n instead of just passing an array. #43326, @bergquist\n * TimeSeries: Add support for negative Y and constant\n transform. #44774, @dprokop\n * Transformations: Add 'JSON' field type to\n ConvertFieldTypeTransformer. #42624, @sd2k\n + Bug fixes (8.4.0):\n * Auth: Guarantee consistency of signed SigV4 headers.\n #45054, @wbrowne\n * CloudWatch: Fix MetricName resetting on Namespace change.\n #44165, @yaelleC\n * Cloudwatch : Fixed reseting metric name when changing\n namespace in Metric Query. #44612, @yaelleC\n * Explore: Avoid locking timepicker when range is inverted.\n #44790, @Elfo404\n * Instrumentation: Fix HTTP request instrumentation of\n authentication failures. #44234, @marefr\n * LibraryPanels: Prevent long descriptions and names from\n obscuring the delete button. #45190, @zuchka\n * OAuth: Fix parsing of ID token if header contains non-string\n value. #44159, @marefr\n * Panel Edit: Visualization search now works correctly with\n special characters. #45137, @ashharrison90\n * Provisioning: Fix duplicate validation when multiple\n organizations have been configured. #44151, @marefr\n * QueryField: Fix issue with undo history when suggestion is\n inserted (#28656). #39114, @glintik\n * TablePanel: Do not prefix columns with frame name if multiple\n frames and override active. #45174, @mdvictor\n + Deprecations (8.4.0):\n AngularJS plugin support is now in a deprecated state, meaning\n it will be removed in a future release. Currently, that is\n planned for version 10 (in 2023). The documentation site has an\n article with more details on why, when, and how. Issue #45149\n- Update to version 8.3.10\n + Security:\n * Fixes XSS vulnerability in the Unified Alerting\n (bsc#1201535, CVE-2022-31097)\n * Fixes OAuth account takeover vulnerability\n (bsc#1201539, CVE-2022-31107)\n- Update to version 8.3.9\n + Bug fixes:\n * Geomap: Display legend\n * Prometheus: Fix timestamp truncation\n- Update to version 8.3.7\n * Provisioning: Ensure that the default value for orgID is set\n when provisioning datasources to be deleted.\n- Update to version 8.3.6\n * Cloud Monitoring: Reduce request size when listing labels.\n * Explore: Show scalar data result in a table instead of graph.\n * Snapshots: Updates the default external snapshot server URL.\n * Table: Makes footer not overlap table content.\n * Tempo: Add request histogram to service graph datalink.\n * Tempo: Add time range to tempo search query behind a feature flag.\n * Tempo: Auto-clear results when changing query type.\n * Tempo: Display start time in search results as relative time.\n * CloudMonitoring: Fix resource labels in query editor.\n * Cursor sync: Apply the settings without saving the dashboard.\n * LibraryPanels: Fix for Error while cleaning library panels.\n * Logs Panel: Fix timestamp parsing for string dates without timezone.\n * Prometheus: Fix some of the alerting queries that use reduce/math operation.\n * TablePanel: Fix ad-hoc variables not working on default datasources.\n * Text Panel: Fix alignment of elements.\n * Variables: Fix for constant variables in self referencing links.\n- Update _constraints to require at least 5GB, because with less we\n can't build it.\n- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422,\n jsc#SLE-24565)\n + Security: Fixes CVE-2021-43813 and CVE-2021-43815,\n bsc#1193686.\n + Security: Fixes CVE-2021-43798, bsc#1193492.\n + Security: Fixes CVE-2021-41244, bsc#1192763.\n + Security: Fixes CVE-2021-41174, bsc#1192383.\n fix CVE-2021-3711, bsc#1189520.\n * Security: Update dependencies to fix CVE-2021-36222,\n bsc#1188571.\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Drop:\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go >= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with >= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060)\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL >= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go >= 1.18 on RHEL\n- Build with Go >= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\npython-pyvmomi:\n\n- Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don't get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand 'ssm' keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of 'Containerized Proxy configuration' 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove 'Undefined return code' from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n- Version 4.3.12-1\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n- Version 4.4.3-1\n- Version 4.4.2-1\n- Version 4.4.1-1\n- Version 4.3.11-1\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about 'rpm.hdr' object has no attribute 'get'\n\nuyuni-proxy-systemd-services:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * Fix script for allowing using container images from different registry paths\n * Allow using container images from different registry paths\n- Version 4.4.1-1\n * Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)\n- Version 4.3.6-1\n * Expose port 80 (bsc#1200142)\n * Use volumes rather than bind mounts\n * TFTPD to listen on udp port (bsc#1200968)\n * Add TAG variable in configuration \n- Version 4.3.5-1\n * Fix containers namespaces in configuration\n- Version 4.3.4-1\n * Rename container_images_path specfile macro to less generic one\n- Version 4.3.3-1\n * Default to SUSE Manager images only when installed from SUSE Manager\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-196,SUSE-SLE-Manager-Tools-15-BETA-2024-196,SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-196", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0196-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0196-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240196-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0196-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html", }, { category: "self", summary: "SUSE Bug 1172110", url: "https://bugzilla.suse.com/1172110", }, { category: "self", summary: "SUSE Bug 1176460", url: "https://bugzilla.suse.com/1176460", }, { category: "self", summary: "SUSE Bug 1180816", url: "https://bugzilla.suse.com/1180816", }, { category: "self", summary: "SUSE Bug 1180942", url: "https://bugzilla.suse.com/1180942", }, { category: "self", summary: "SUSE Bug 1181119", url: "https://bugzilla.suse.com/1181119", }, { category: "self", summary: "SUSE Bug 1181935", url: "https://bugzilla.suse.com/1181935", }, { category: "self", summary: "SUSE Bug 1183684", url: "https://bugzilla.suse.com/1183684", }, { category: "self", summary: "SUSE Bug 1187725", url: "https://bugzilla.suse.com/1187725", }, { category: "self", summary: "SUSE Bug 1188061", url: "https://bugzilla.suse.com/1188061", }, { category: "self", summary: "SUSE Bug 1188571", url: "https://bugzilla.suse.com/1188571", }, { category: "self", summary: "SUSE Bug 1189520", url: "https://bugzilla.suse.com/1189520", }, { category: "self", summary: "SUSE Bug 1191454", url: "https://bugzilla.suse.com/1191454", }, { category: "self", summary: "SUSE Bug 1192154", url: "https://bugzilla.suse.com/1192154", }, { category: "self", summary: "SUSE Bug 1192383", url: "https://bugzilla.suse.com/1192383", }, { category: "self", summary: "SUSE Bug 1192696", url: "https://bugzilla.suse.com/1192696", }, { category: "self", summary: "SUSE Bug 1192763", url: "https://bugzilla.suse.com/1192763", }, { category: "self", summary: "SUSE Bug 1193492", url: "https://bugzilla.suse.com/1193492", }, { category: "self", summary: "SUSE Bug 1193686", url: "https://bugzilla.suse.com/1193686", }, { category: "self", summary: "SUSE Bug 1193688", url: "https://bugzilla.suse.com/1193688", }, { category: "self", summary: "SUSE Bug 1197507", url: "https://bugzilla.suse.com/1197507", }, { category: "self", summary: "SUSE Bug 1198903", url: "https://bugzilla.suse.com/1198903", }, { category: "self", summary: "SUSE Bug 1199810", url: "https://bugzilla.suse.com/1199810", }, { category: "self", summary: "SUSE Bug 1200142", url: "https://bugzilla.suse.com/1200142", }, { category: "self", summary: "SUSE Bug 1200480", url: "https://bugzilla.suse.com/1200480", }, { category: "self", summary: "SUSE Bug 1200591", url: "https://bugzilla.suse.com/1200591", }, { category: "self", summary: "SUSE Bug 1200968", url: "https://bugzilla.suse.com/1200968", }, { category: "self", summary: "SUSE Bug 1200970", url: "https://bugzilla.suse.com/1200970", }, { category: "self", summary: "SUSE Bug 1201003", url: "https://bugzilla.suse.com/1201003", }, { category: "self", summary: "SUSE Bug 1201059", url: "https://bugzilla.suse.com/1201059", }, { category: "self", summary: "SUSE Bug 1201535", url: "https://bugzilla.suse.com/1201535", }, { category: "self", summary: "SUSE Bug 1201539", url: "https://bugzilla.suse.com/1201539", }, { category: "self", summary: "SUSE Bug 1202614", url: "https://bugzilla.suse.com/1202614", }, { category: "self", summary: "SUSE Bug 1202945", url: "https://bugzilla.suse.com/1202945", }, { category: "self", summary: "SUSE Bug 1203283", url: "https://bugzilla.suse.com/1203283", }, { category: "self", summary: "SUSE Bug 1203596", url: "https://bugzilla.suse.com/1203596", }, { category: "self", summary: "SUSE Bug 1203597", url: "https://bugzilla.suse.com/1203597", }, { category: "self", summary: "SUSE Bug 1203599", url: "https://bugzilla.suse.com/1203599", }, { category: "self", summary: "SUSE Bug 1204032", url: "https://bugzilla.suse.com/1204032", }, { category: "self", summary: "SUSE Bug 1204126", url: "https://bugzilla.suse.com/1204126", }, { category: "self", summary: "SUSE Bug 1204302", url: "https://bugzilla.suse.com/1204302", }, { category: "self", summary: "SUSE Bug 1204303", url: "https://bugzilla.suse.com/1204303", }, { category: "self", summary: "SUSE Bug 1204304", url: "https://bugzilla.suse.com/1204304", }, { category: "self", summary: "SUSE Bug 1204305", url: "https://bugzilla.suse.com/1204305", }, { category: "self", summary: "SUSE Bug 1204501", url: "https://bugzilla.suse.com/1204501", }, { category: "self", summary: "SUSE Bug 1205207", url: "https://bugzilla.suse.com/1205207", }, { category: "self", summary: "SUSE Bug 1205225", url: "https://bugzilla.suse.com/1205225", }, { category: "self", summary: "SUSE Bug 1205227", url: "https://bugzilla.suse.com/1205227", }, { category: "self", summary: "SUSE Bug 1205599", url: "https://bugzilla.suse.com/1205599", }, { category: "self", summary: "SUSE Bug 1205759", url: "https://bugzilla.suse.com/1205759", }, { category: "self", summary: "SUSE Bug 1207352", url: "https://bugzilla.suse.com/1207352", }, { category: "self", summary: "SUSE Bug 1207749", url: "https://bugzilla.suse.com/1207749", }, { category: "self", summary: "SUSE Bug 1207750", url: "https://bugzilla.suse.com/1207750", }, { category: "self", summary: "SUSE Bug 1207830", url: "https://bugzilla.suse.com/1207830", }, { category: "self", summary: "SUSE Bug 1208046", url: "https://bugzilla.suse.com/1208046", }, { category: "self", summary: "SUSE Bug 1208049", url: "https://bugzilla.suse.com/1208049", }, { category: "self", summary: "SUSE Bug 1208060", url: "https://bugzilla.suse.com/1208060", }, { category: "self", summary: "SUSE Bug 1208062", url: "https://bugzilla.suse.com/1208062", }, { category: "self", summary: "SUSE Bug 1208065", url: "https://bugzilla.suse.com/1208065", }, { category: "self", summary: "SUSE Bug 1208270", url: "https://bugzilla.suse.com/1208270", }, { category: "self", summary: "SUSE Bug 1208293", url: "https://bugzilla.suse.com/1208293", }, { category: "self", summary: "SUSE Bug 1208298", url: "https://bugzilla.suse.com/1208298", }, { category: "self", summary: "SUSE Bug 1208612", url: "https://bugzilla.suse.com/1208612", }, { category: "self", summary: "SUSE Bug 1208692", url: "https://bugzilla.suse.com/1208692", }, { category: "self", summary: "SUSE Bug 1208719", url: "https://bugzilla.suse.com/1208719", }, { category: "self", summary: "SUSE Bug 1208819", url: "https://bugzilla.suse.com/1208819", }, { category: "self", summary: "SUSE Bug 1208821", url: "https://bugzilla.suse.com/1208821", }, { category: "self", summary: "SUSE Bug 1208965", url: "https://bugzilla.suse.com/1208965", }, { category: "self", summary: "SUSE Bug 1209113", url: "https://bugzilla.suse.com/1209113", }, { category: "self", summary: "SUSE Bug 1209645", url: "https://bugzilla.suse.com/1209645", }, { category: "self", summary: "SUSE Bug 1210458", url: "https://bugzilla.suse.com/1210458", }, { category: "self", summary: "SUSE Bug 1210640", url: "https://bugzilla.suse.com/1210640", }, { category: "self", summary: "SUSE Bug 1210907", url: "https://bugzilla.suse.com/1210907", }, { category: "self", summary: "SUSE Bug 1211525", url: "https://bugzilla.suse.com/1211525", }, { category: "self", summary: "SUSE Bug 1212099", url: "https://bugzilla.suse.com/1212099", }, { category: "self", summary: "SUSE Bug 1212100", url: "https://bugzilla.suse.com/1212100", }, { category: "self", summary: "SUSE Bug 1212279", url: "https://bugzilla.suse.com/1212279", }, { category: "self", summary: "SUSE Bug 1212641", url: "https://bugzilla.suse.com/1212641", }, { category: "self", summary: "SUSE Bug 1218843", url: "https://bugzilla.suse.com/1218843", }, { category: "self", summary: "SUSE Bug 1218844", url: "https://bugzilla.suse.com/1218844", }, { category: "self", summary: "SUSE CVE CVE-2020-7753 page", url: "https://www.suse.com/security/cve/CVE-2020-7753/", }, { category: "self", summary: "SUSE CVE CVE-2021-20178 page", url: "https://www.suse.com/security/cve/CVE-2021-20178/", }, { category: "self", summary: "SUSE CVE CVE-2021-20180 page", url: "https://www.suse.com/security/cve/CVE-2021-20180/", }, { category: "self", summary: "SUSE CVE CVE-2021-20191 page", url: "https://www.suse.com/security/cve/CVE-2021-20191/", }, { category: "self", summary: "SUSE CVE CVE-2021-20228 page", url: "https://www.suse.com/security/cve/CVE-2021-20228/", }, { category: "self", summary: "SUSE CVE CVE-2021-3447 page", url: "https://www.suse.com/security/cve/CVE-2021-3447/", }, { category: "self", summary: "SUSE CVE CVE-2021-3583 page", url: "https://www.suse.com/security/cve/CVE-2021-3583/", }, { category: "self", summary: "SUSE CVE CVE-2021-3620 page", url: "https://www.suse.com/security/cve/CVE-2021-3620/", }, { category: "self", summary: "SUSE CVE CVE-2021-36222 page", url: "https://www.suse.com/security/cve/CVE-2021-36222/", }, { category: "self", summary: "SUSE CVE CVE-2021-3711 page", url: "https://www.suse.com/security/cve/CVE-2021-3711/", }, { category: "self", summary: "SUSE CVE CVE-2021-3807 page", url: "https://www.suse.com/security/cve/CVE-2021-3807/", }, { category: "self", summary: "SUSE CVE CVE-2021-3918 page", url: "https://www.suse.com/security/cve/CVE-2021-3918/", }, { category: "self", summary: "SUSE CVE CVE-2021-41174 page", url: "https://www.suse.com/security/cve/CVE-2021-41174/", }, { category: "self", summary: "SUSE CVE CVE-2021-41244 page", url: "https://www.suse.com/security/cve/CVE-2021-41244/", }, { category: "self", summary: "SUSE CVE CVE-2021-43138 page", url: "https://www.suse.com/security/cve/CVE-2021-43138/", }, { category: "self", summary: "SUSE CVE CVE-2021-43798 page", url: "https://www.suse.com/security/cve/CVE-2021-43798/", }, { category: "self", summary: "SUSE CVE CVE-2021-43813 page", url: "https://www.suse.com/security/cve/CVE-2021-43813/", }, { category: "self", summary: "SUSE CVE CVE-2021-43815 page", url: "https://www.suse.com/security/cve/CVE-2021-43815/", }, { category: "self", summary: "SUSE CVE CVE-2022-0155 page", url: "https://www.suse.com/security/cve/CVE-2022-0155/", }, { category: "self", summary: "SUSE CVE CVE-2022-23552 page", url: "https://www.suse.com/security/cve/CVE-2022-23552/", }, { category: "self", summary: "SUSE CVE CVE-2022-27664 page", url: "https://www.suse.com/security/cve/CVE-2022-27664/", }, { category: "self", summary: "SUSE CVE CVE-2022-29170 page", url: "https://www.suse.com/security/cve/CVE-2022-29170/", }, { category: "self", summary: "SUSE CVE CVE-2022-31097 page", url: "https://www.suse.com/security/cve/CVE-2022-31097/", }, { category: "self", summary: "SUSE CVE CVE-2022-31107 page", url: "https://www.suse.com/security/cve/CVE-2022-31107/", }, { category: "self", summary: "SUSE CVE CVE-2022-31123 page", url: "https://www.suse.com/security/cve/CVE-2022-31123/", }, { category: "self", summary: "SUSE CVE CVE-2022-31130 page", url: "https://www.suse.com/security/cve/CVE-2022-31130/", }, { category: "self", summary: "SUSE CVE CVE-2022-32149 page", url: "https://www.suse.com/security/cve/CVE-2022-32149/", }, { category: "self", summary: "SUSE CVE CVE-2022-35957 page", url: "https://www.suse.com/security/cve/CVE-2022-35957/", }, { category: "self", summary: "SUSE CVE CVE-2022-36062 page", url: "https://www.suse.com/security/cve/CVE-2022-36062/", }, { category: "self", summary: "SUSE CVE CVE-2022-39201 page", url: "https://www.suse.com/security/cve/CVE-2022-39201/", }, { category: "self", summary: "SUSE CVE CVE-2022-39229 page", url: "https://www.suse.com/security/cve/CVE-2022-39229/", }, { category: "self", summary: "SUSE CVE CVE-2022-39306 page", url: "https://www.suse.com/security/cve/CVE-2022-39306/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, { category: "self", summary: "SUSE CVE CVE-2022-39324 page", url: "https://www.suse.com/security/cve/CVE-2022-39324/", }, { category: "self", summary: "SUSE CVE CVE-2022-41715 page", url: "https://www.suse.com/security/cve/CVE-2022-41715/", }, { category: "self", summary: "SUSE CVE CVE-2022-41723 page", url: "https://www.suse.com/security/cve/CVE-2022-41723/", }, { category: "self", summary: "SUSE CVE CVE-2022-46146 page", url: "https://www.suse.com/security/cve/CVE-2022-46146/", }, { category: "self", summary: "SUSE CVE CVE-2023-0507 page", url: "https://www.suse.com/security/cve/CVE-2023-0507/", }, { category: "self", summary: "SUSE CVE CVE-2023-0594 page", url: "https://www.suse.com/security/cve/CVE-2023-0594/", }, { category: "self", summary: "SUSE CVE CVE-2023-1387 page", url: "https://www.suse.com/security/cve/CVE-2023-1387/", }, { category: "self", summary: "SUSE CVE CVE-2023-1410 page", url: "https://www.suse.com/security/cve/CVE-2023-1410/", }, { category: "self", summary: "SUSE CVE CVE-2023-2183 page", url: "https://www.suse.com/security/cve/CVE-2023-2183/", }, { category: "self", summary: "SUSE CVE CVE-2023-2801 page", url: "https://www.suse.com/security/cve/CVE-2023-2801/", }, { category: "self", summary: "SUSE CVE CVE-2023-3128 page", url: "https://www.suse.com/security/cve/CVE-2023-3128/", }, ], title: "Security Beta update for SUSE Manager Client Tools and Salt", tracking: { current_release_date: "2024-01-23T15:20:05Z", generator: { date: "2024-01-23T15:20:05Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0196-1", initial_release_date: "2024-01-23T15:20:05Z", revision_history: [ { date: "2024-01-23T15:20:05Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", product: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", product_id: "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", }, }, { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", product: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", product_id: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", product: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", product_id: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", }, }, { category: "product_version", name: "grafana-9.5.8-159000.4.24.1.aarch64", product: { name: "grafana-9.5.8-159000.4.24.1.aarch64", product_id: "grafana-9.5.8-159000.4.24.1.aarch64", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", product: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", product_id: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", product: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", product_id: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", product: { name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", product_id: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", }, }, { category: "product_version", name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", product: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", product_id: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", }, }, { category: "product_version", name: "python3-yarl-1.3.0-159000.3.6.1.aarch64", product: { name: "python3-yarl-1.3.0-159000.3.6.1.aarch64", product_id: "python3-yarl-1.3.0-159000.3.6.1.aarch64", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-159000.3.18.1.aarch64", product: { name: "uyuni-base-common-5.0.1-159000.3.18.1.aarch64", product_id: "uyuni-base-common-5.0.1-159000.3.18.1.aarch64", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64", product: { name: "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64", product_id: "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64", }, }, { category: "product_version", name: "uyuni-base-server-5.0.1-159000.3.18.1.aarch64", product: { name: "uyuni-base-server-5.0.1-159000.3.18.1.aarch64", product_id: "uyuni-base-server-5.0.1-159000.3.18.1.aarch64", }, }, { category: "product_version", name: "wire-0.5.0-159000.3.9.1.aarch64", product: { name: "wire-0.5.0-159000.3.9.1.aarch64", product_id: "wire-0.5.0-159000.3.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "ansible-2.9.27-159000.3.9.1.noarch", product: { name: "ansible-2.9.27-159000.3.9.1.noarch", product_id: "ansible-2.9.27-159000.3.9.1.noarch", }, }, { category: "product_version", name: "ansible-doc-2.9.27-159000.3.9.1.noarch", product: { name: "ansible-doc-2.9.27-159000.3.9.1.noarch", product_id: "ansible-doc-2.9.27-159000.3.9.1.noarch", }, }, { category: "product_version", name: "ansible-test-2.9.27-159000.3.9.1.noarch", product: { name: "ansible-test-2.9.27-159000.3.9.1.noarch", product_id: "ansible-test-2.9.27-159000.3.9.1.noarch", }, }, { category: "product_version", name: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", product: { name: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", product_id: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", }, }, { category: "product_version", name: "mgr-push-5.0.1-159000.4.21.1.noarch", product: { name: "mgr-push-5.0.1-159000.4.21.1.noarch", product_id: "mgr-push-5.0.1-159000.4.21.1.noarch", }, }, { category: "product_version", name: "python2-hwdata-2.3.5-159000.5.13.1.noarch", product: { name: "python2-hwdata-2.3.5-159000.5.13.1.noarch", product_id: "python2-hwdata-2.3.5-159000.5.13.1.noarch", }, }, { category: "product_version", name: "python2-pyvmomi-6.7.3-159000.3.6.1.noarch", product: { name: "python2-pyvmomi-6.7.3-159000.3.6.1.noarch", product_id: "python2-pyvmomi-6.7.3-159000.3.6.1.noarch", }, }, { category: "product_version", name: "python3-hwdata-2.3.5-159000.5.13.1.noarch", product: { name: "python3-hwdata-2.3.5-159000.5.13.1.noarch", product_id: "python3-hwdata-2.3.5-159000.5.13.1.noarch", }, }, { category: "product_version", name: "python3-mgr-push-5.0.1-159000.4.21.1.noarch", product: { name: "python3-mgr-push-5.0.1-159000.4.21.1.noarch", product_id: "python3-mgr-push-5.0.1-159000.4.21.1.noarch", }, }, { category: "product_version", name: "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", product: { name: "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", product_id: "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", }, }, { category: "product_version", name: "python3-rhnlib-5.0.1-159000.6.30.1.noarch", product: { name: "python3-rhnlib-5.0.1-159000.6.30.1.noarch", product_id: "python3-rhnlib-5.0.1-159000.6.30.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", product: { name: "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", product_id: "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", product: { name: "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", product_id: "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", product: { name: "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", product_id: "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "spacecmd-5.0.1-159000.6.42.1.noarch", product: { name: "spacecmd-5.0.1-159000.6.42.1.noarch", product_id: "spacecmd-5.0.1-159000.6.42.1.noarch", }, }, { category: "product_version", name: "spacewalk-check-5.0.1-159000.6.48.1.noarch", product: { name: "spacewalk-check-5.0.1-159000.6.48.1.noarch", product_id: "spacewalk-check-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", product: { name: "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", product_id: "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", product: { name: "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", product_id: "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", }, }, { category: "product_version", name: "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", product: { name: "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", product_id: "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", }, }, { category: "product_version", name: "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", product: { name: "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", product_id: "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", }, }, { category: "product_version", name: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", product: { name: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", product_id: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", product: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", product_id: "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", }, }, { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", product: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", product_id: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", product: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", product_id: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", }, }, { category: "product_version", name: "grafana-9.5.8-159000.4.24.1.ppc64le", product: { name: "grafana-9.5.8-159000.4.24.1.ppc64le", product_id: "grafana-9.5.8-159000.4.24.1.ppc64le", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", product: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", product_id: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", product: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", product_id: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", product: { name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", product_id: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", }, }, { category: "product_version", name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", product: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", product_id: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", }, }, { category: "product_version", name: "python3-yarl-1.3.0-159000.3.6.1.ppc64le", product: { name: "python3-yarl-1.3.0-159000.3.6.1.ppc64le", product_id: "python3-yarl-1.3.0-159000.3.6.1.ppc64le", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le", product: { name: "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le", product_id: "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le", product: { name: "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le", product_id: "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le", }, }, { category: "product_version", name: "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le", product: { name: "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le", product_id: "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le", }, }, { category: "product_version", name: "wire-0.5.0-159000.3.9.1.ppc64le", product: { name: "wire-0.5.0-159000.3.9.1.ppc64le", product_id: "wire-0.5.0-159000.3.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", product: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", product_id: "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", }, }, { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", product: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", product_id: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", product: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", product_id: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", }, }, { category: "product_version", name: "grafana-9.5.8-159000.4.24.1.s390x", product: { name: "grafana-9.5.8-159000.4.24.1.s390x", product_id: "grafana-9.5.8-159000.4.24.1.s390x", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", product: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", product_id: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", product: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", product_id: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", product: { name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", product_id: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", }, }, { category: "product_version", name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", product: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", product_id: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", }, }, { category: "product_version", name: "python3-yarl-1.3.0-159000.3.6.1.s390x", product: { name: "python3-yarl-1.3.0-159000.3.6.1.s390x", product_id: "python3-yarl-1.3.0-159000.3.6.1.s390x", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-159000.3.18.1.s390x", product: { name: "uyuni-base-common-5.0.1-159000.3.18.1.s390x", product_id: "uyuni-base-common-5.0.1-159000.3.18.1.s390x", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x", product: { name: "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x", product_id: "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x", }, }, { category: "product_version", name: "uyuni-base-server-5.0.1-159000.3.18.1.s390x", product: { name: "uyuni-base-server-5.0.1-159000.3.18.1.s390x", product_id: "uyuni-base-server-5.0.1-159000.3.18.1.s390x", }, }, { category: "product_version", name: "wire-0.5.0-159000.3.9.1.s390x", product: { name: "wire-0.5.0-159000.3.9.1.s390x", product_id: "wire-0.5.0-159000.3.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", product: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", product_id: "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", }, }, { category: "product_version", name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", product: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", product_id: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", }, }, { category: "product_version", name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", product: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", product_id: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", }, }, { category: "product_version", name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", product: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", product_id: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", }, }, { category: "product_version", name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", product: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", product_id: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", }, }, { category: "product_version", name: "grafana-9.5.8-159000.4.24.1.x86_64", product: { name: "grafana-9.5.8-159000.4.24.1.x86_64", product_id: "grafana-9.5.8-159000.4.24.1.x86_64", }, }, { category: "product_version", name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", product: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", product_id: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", }, }, { category: "product_version", name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", product: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", product_id: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", product: { name: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", product_id: "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", }, }, { category: "product_version", name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", product: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", product_id: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", }, }, { category: "product_version", name: "python3-yarl-1.3.0-159000.3.6.1.x86_64", product: { name: "python3-yarl-1.3.0-159000.3.6.1.x86_64", product_id: "python3-yarl-1.3.0-159000.3.6.1.x86_64", }, }, { category: "product_version", name: "uyuni-base-common-5.0.1-159000.3.18.1.x86_64", product: { name: "uyuni-base-common-5.0.1-159000.3.18.1.x86_64", product_id: "uyuni-base-common-5.0.1-159000.3.18.1.x86_64", }, }, { category: "product_version", name: "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64", product: { name: "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64", product_id: "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64", }, }, { category: "product_version", name: "uyuni-base-server-5.0.1-159000.3.18.1.x86_64", product: { name: "uyuni-base-server-5.0.1-159000.3.18.1.x86_64", product_id: "uyuni-base-server-5.0.1-159000.3.18.1.x86_64", }, }, { category: "product_version", name: "wire-0.5.0-159000.3.9.1.x86_64", product: { name: "wire-0.5.0-159000.3.9.1.x86_64", product_id: "wire-0.5.0-159000.3.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Manager Client Tools 15-BETA", product: { name: "SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA", }, }, { category: "product_name", name: "SUSE Manager Client Tools Beta for SLE Micro 5", product: { name: "SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5", product_identification_helper: { cpe: "cpe:/o:suse:sle-manager-tools-beta-micro:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "ansible-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", }, product_reference: "ansible-2.9.27-159000.3.9.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "ansible-doc-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", }, product_reference: "ansible-doc-2.9.27-159000.3.9.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", }, product_reference: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", }, product_reference: "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", }, product_reference: "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", }, product_reference: "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", }, product_reference: "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", }, product_reference: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", }, product_reference: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", }, product_reference: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", }, product_reference: "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", }, product_reference: "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", }, product_reference: "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-159000.4.24.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", }, product_reference: "grafana-9.5.8-159000.4.24.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-159000.4.24.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", }, product_reference: "grafana-9.5.8-159000.4.24.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-159000.4.24.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", }, product_reference: "grafana-9.5.8-159000.4.24.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "grafana-9.5.8-159000.4.24.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", }, product_reference: "grafana-9.5.8-159000.4.24.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", }, product_reference: "mgr-push-5.0.1-159000.4.21.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", }, product_reference: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", }, product_reference: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", }, product_reference: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", }, product_reference: "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-hwdata-2.3.5-159000.5.13.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", }, product_reference: "python3-hwdata-2.3.5-159000.5.13.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", }, product_reference: "python3-mgr-push-5.0.1-159000.4.21.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-pyvmomi-6.7.3-159000.3.6.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", }, product_reference: "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-rhnlib-5.0.1-159000.6.30.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", }, product_reference: "python3-rhnlib-5.0.1-159000.6.30.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", }, product_reference: "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", }, product_reference: "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", }, product_reference: "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", }, product_reference: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", }, product_reference: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", }, product_reference: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", }, product_reference: "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "spacecmd-5.0.1-159000.6.42.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", }, product_reference: "spacecmd-5.0.1-159000.6.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", }, product_reference: "spacewalk-check-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", }, product_reference: "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", }, product_reference: "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", }, product_reference: "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", }, product_reference: "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", product_id: "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", }, product_reference: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15-BETA", }, { category: "default_component_of", full_product_name: { name: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", }, product_reference: "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", }, product_reference: "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", }, product_reference: "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5", product_id: "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", }, product_reference: "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools Beta for SLE Micro 5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-7753", }, ], notes: [ { category: "general", text: "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-7753", url: "https://www.suse.com/security/cve/CVE-2020-7753", }, { category: "external", summary: "SUSE Bug 1218843 for CVE-2020-7753", url: "https://bugzilla.suse.com/1218843", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2020-7753", }, { cve: "CVE-2021-20178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20178", }, ], notes: [ { category: "general", text: "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-20178", url: "https://www.suse.com/security/cve/CVE-2021-20178", }, { category: "external", summary: "SUSE Bug 1180816 for CVE-2021-20178", url: "https://bugzilla.suse.com/1180816", }, { category: "external", summary: "SUSE Bug 1186493 for CVE-2021-20178", url: "https://bugzilla.suse.com/1186493", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-20178", }, { cve: "CVE-2021-20180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20180", }, ], notes: [ { category: "general", text: "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-20180", url: "https://www.suse.com/security/cve/CVE-2021-20180", }, { category: "external", summary: "SUSE Bug 1180942 for CVE-2021-20180", url: "https://bugzilla.suse.com/1180942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-20180", }, { cve: "CVE-2021-20191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20191", }, ], notes: [ { category: "general", text: "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-20191", url: "https://www.suse.com/security/cve/CVE-2021-20191", }, { category: "external", summary: "SUSE Bug 1181119 for CVE-2021-20191", url: "https://bugzilla.suse.com/1181119", }, { category: "external", summary: "SUSE Bug 1181935 for CVE-2021-20191", url: "https://bugzilla.suse.com/1181935", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-20191", }, { cve: "CVE-2021-20228", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20228", }, ], notes: [ { category: "general", text: "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-20228", url: "https://www.suse.com/security/cve/CVE-2021-20228", }, { category: "external", summary: "SUSE Bug 1181935 for CVE-2021-20228", url: "https://bugzilla.suse.com/1181935", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-20228", }, { cve: "CVE-2021-3447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3447", }, ], notes: [ { category: "general", text: "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3447", url: "https://www.suse.com/security/cve/CVE-2021-3447", }, { category: "external", summary: "SUSE Bug 1183684 for CVE-2021-3447", url: "https://bugzilla.suse.com/1183684", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-3447", }, { cve: "CVE-2021-3583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3583", }, ], notes: [ { category: "general", text: "A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3583", url: "https://www.suse.com/security/cve/CVE-2021-3583", }, { category: "external", summary: "SUSE Bug 1188061 for CVE-2021-3583", url: "https://bugzilla.suse.com/1188061", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-3583", }, { cve: "CVE-2021-3620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3620", }, ], notes: [ { category: "general", text: "A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3620", url: "https://www.suse.com/security/cve/CVE-2021-3620", }, { category: "external", summary: "SUSE Bug 1187725 for CVE-2021-3620", url: "https://bugzilla.suse.com/1187725", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-3620", }, { cve: "CVE-2021-36222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-36222", }, ], notes: [ { category: "general", text: "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-36222", url: "https://www.suse.com/security/cve/CVE-2021-36222", }, { category: "external", summary: "SUSE Bug 1188571 for CVE-2021-36222", url: "https://bugzilla.suse.com/1188571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2021-36222", }, { cve: "CVE-2021-3711", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3711", }, ], notes: [ { category: "general", text: "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3711", url: "https://www.suse.com/security/cve/CVE-2021-3711", }, { category: "external", summary: "SUSE Bug 1189520 for CVE-2021-3711", url: "https://bugzilla.suse.com/1189520", }, { category: "external", summary: "SUSE Bug 1190129 for CVE-2021-3711", url: "https://bugzilla.suse.com/1190129", }, { category: "external", summary: "SUSE Bug 1192100 for CVE-2021-3711", url: "https://bugzilla.suse.com/1192100", }, { category: "external", summary: "SUSE Bug 1205663 for CVE-2021-3711", url: "https://bugzilla.suse.com/1205663", }, { category: "external", summary: "SUSE Bug 1225628 for CVE-2021-3711", url: "https://bugzilla.suse.com/1225628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "critical", }, ], title: "CVE-2021-3711", }, { cve: "CVE-2021-3807", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3807", }, ], notes: [ { category: "general", text: "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3807", url: "https://www.suse.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "SUSE Bug 1192154 for CVE-2021-3807", url: "https://bugzilla.suse.com/1192154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2021-3807", }, { cve: "CVE-2021-3918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3918", }, ], notes: [ { category: "general", text: "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3918", url: "https://www.suse.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "SUSE Bug 1192696 for CVE-2021-3918", url: "https://bugzilla.suse.com/1192696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2021-3918", }, { cve: "CVE-2021-41174", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41174", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor('alert(1)')()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-41174", url: "https://www.suse.com/security/cve/CVE-2021-41174", }, { category: "external", summary: "SUSE Bug 1192383 for CVE-2021-41174", url: "https://bugzilla.suse.com/1192383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-41174", }, { cve: "CVE-2021-41244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41244", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users' roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-41244", url: "https://www.suse.com/security/cve/CVE-2021-41244", }, { category: "external", summary: "SUSE Bug 1192763 for CVE-2021-41244", url: "https://bugzilla.suse.com/1192763", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "critical", }, ], title: "CVE-2021-41244", }, { cve: "CVE-2021-43138", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43138", }, ], notes: [ { category: "general", text: "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43138", url: "https://www.suse.com/security/cve/CVE-2021-43138", }, { category: "external", summary: "SUSE Bug 1200480 for CVE-2021-43138", url: "https://bugzilla.suse.com/1200480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2021-43138", }, { cve: "CVE-2021-43798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43798", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43798", url: "https://www.suse.com/security/cve/CVE-2021-43798", }, { category: "external", summary: "SUSE Bug 1193492 for CVE-2021-43798", url: "https://bugzilla.suse.com/1193492", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2021-43798", }, { cve: "CVE-2021-43813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43813", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43813", url: "https://www.suse.com/security/cve/CVE-2021-43813", }, { category: "external", summary: "SUSE Bug 1193686 for CVE-2021-43813", url: "https://bugzilla.suse.com/1193686", }, { category: "external", summary: "SUSE Bug 1193688 for CVE-2021-43813", url: "https://bugzilla.suse.com/1193688", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-43813", }, { cve: "CVE-2021-43815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43815", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-43815", url: "https://www.suse.com/security/cve/CVE-2021-43815", }, { category: "external", summary: "SUSE Bug 1193686 for CVE-2021-43815", url: "https://bugzilla.suse.com/1193686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2021-43815", }, { cve: "CVE-2022-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0155", }, ], notes: [ { category: "general", text: "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0155", url: "https://www.suse.com/security/cve/CVE-2022-0155", }, { category: "external", summary: "SUSE Bug 1218844 for CVE-2022-0155", url: "https://bugzilla.suse.com/1218844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-0155", }, { cve: "CVE-2022-23552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23552", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-23552", url: "https://www.suse.com/security/cve/CVE-2022-23552", }, { category: "external", summary: "SUSE Bug 1207749 for CVE-2022-23552", url: "https://bugzilla.suse.com/1207749", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-23552", }, { cve: "CVE-2022-27664", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27664", }, ], notes: [ { category: "general", text: "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-27664", url: "https://www.suse.com/security/cve/CVE-2022-27664", }, { category: "external", summary: "SUSE Bug 1203185 for CVE-2022-27664", url: "https://bugzilla.suse.com/1203185", }, { category: "external", summary: "SUSE Bug 1203293 for CVE-2022-27664", url: "https://bugzilla.suse.com/1203293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-27664", }, { cve: "CVE-2022-29170", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29170", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn't call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-29170", url: "https://www.suse.com/security/cve/CVE-2022-29170", }, { category: "external", summary: "SUSE Bug 1199810 for CVE-2022-29170", url: "https://bugzilla.suse.com/1199810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-29170", }, { cve: "CVE-2022-31097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31097", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31097", url: "https://www.suse.com/security/cve/CVE-2022-31097", }, { category: "external", summary: "SUSE Bug 1201535 for CVE-2022-31097", url: "https://bugzilla.suse.com/1201535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-31097", }, { cve: "CVE-2022-31107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31107", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user's Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31107", url: "https://www.suse.com/security/cve/CVE-2022-31107", }, { category: "external", summary: "SUSE Bug 1201539 for CVE-2022-31107", url: "https://bugzilla.suse.com/1201539", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-31107", }, { cve: "CVE-2022-31123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31123", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31123", url: "https://www.suse.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "SUSE Bug 1204302 for CVE-2022-31123", url: "https://bugzilla.suse.com/1204302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "low", }, ], title: "CVE-2022-31123", }, { cve: "CVE-2022-31130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31130", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31130", url: "https://www.suse.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "SUSE Bug 1204305 for CVE-2022-31130", url: "https://bugzilla.suse.com/1204305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-31130", }, { cve: "CVE-2022-32149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32149", }, ], notes: [ { category: "general", text: "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-32149", url: "https://www.suse.com/security/cve/CVE-2022-32149", }, { category: "external", summary: "SUSE Bug 1204501 for CVE-2022-32149", url: "https://bugzilla.suse.com/1204501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-32149", }, { cve: "CVE-2022-35957", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-35957", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-35957", url: "https://www.suse.com/security/cve/CVE-2022-35957", }, { category: "external", summary: "SUSE Bug 1203597 for CVE-2022-35957", url: "https://bugzilla.suse.com/1203597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-35957", }, { cve: "CVE-2022-36062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36062", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-36062", url: "https://www.suse.com/security/cve/CVE-2022-36062", }, { category: "external", summary: "SUSE Bug 1203596 for CVE-2022-36062", url: "https://bugzilla.suse.com/1203596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-36062", }, { cve: "CVE-2022-39201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39201", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39201", url: "https://www.suse.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "SUSE Bug 1204303 for CVE-2022-39201", url: "https://bugzilla.suse.com/1204303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-39201", }, { cve: "CVE-2022-39229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39229", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39229", url: "https://www.suse.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "SUSE Bug 1204304 for CVE-2022-39229", url: "https://bugzilla.suse.com/1204304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "low", }, ], title: "CVE-2022-39229", }, { cve: "CVE-2022-39306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39306", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39306", url: "https://www.suse.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "SUSE Bug 1205225 for CVE-2022-39306", url: "https://bugzilla.suse.com/1205225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-39307", }, { cve: "CVE-2022-39324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39324", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker's injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39324", url: "https://www.suse.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "SUSE Bug 1207750 for CVE-2022-39324", url: "https://bugzilla.suse.com/1207750", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-39324", }, { cve: "CVE-2022-41715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41715", }, ], notes: [ { category: "general", text: "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-41715", url: "https://www.suse.com/security/cve/CVE-2022-41715", }, { category: "external", summary: "SUSE Bug 1204023 for CVE-2022-41715", url: "https://bugzilla.suse.com/1204023", }, { category: "external", summary: "SUSE Bug 1208441 for CVE-2022-41715", url: "https://bugzilla.suse.com/1208441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2022-41715", }, { cve: "CVE-2022-41723", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41723", }, ], notes: [ { category: "general", text: "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-41723", url: "https://www.suse.com/security/cve/CVE-2022-41723", }, { category: "external", summary: "SUSE Bug 1208270 for CVE-2022-41723", url: "https://bugzilla.suse.com/1208270", }, { category: "external", summary: "SUSE Bug 1215588 for CVE-2022-41723", url: "https://bugzilla.suse.com/1215588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-41723", }, { cve: "CVE-2022-46146", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-46146", }, ], notes: [ { category: "general", text: "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-46146", url: "https://www.suse.com/security/cve/CVE-2022-46146", }, { category: "external", summary: "SUSE Bug 1208046 for CVE-2022-46146", url: "https://bugzilla.suse.com/1208046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2022-46146", }, { cve: "CVE-2023-0507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0507", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-0507", url: "https://www.suse.com/security/cve/CVE-2023-0507", }, { category: "external", summary: "SUSE Bug 1208821 for CVE-2023-0507", url: "https://bugzilla.suse.com/1208821", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2023-0507", }, { cve: "CVE-2023-0594", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0594", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-0594", url: "https://www.suse.com/security/cve/CVE-2023-0594", }, { category: "external", summary: "SUSE Bug 1208819 for CVE-2023-0594", url: "https://bugzilla.suse.com/1208819", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2023-0594", }, { cve: "CVE-2023-1387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1387", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-1387", url: "https://www.suse.com/security/cve/CVE-2023-1387", }, { category: "external", summary: "SUSE Bug 1210907 for CVE-2023-1387", url: "https://bugzilla.suse.com/1210907", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2023-1387", }, { cve: "CVE-2023-1410", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1410", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-1410", url: "https://www.suse.com/security/cve/CVE-2023-1410", }, { category: "external", summary: "SUSE Bug 1209645 for CVE-2023-1410", url: "https://bugzilla.suse.com/1209645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2023-1410", }, { cve: "CVE-2023-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2183", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-2183", url: "https://www.suse.com/security/cve/CVE-2023-2183", }, { category: "external", summary: "SUSE Bug 1212100 for CVE-2023-2183", url: "https://bugzilla.suse.com/1212100", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "moderate", }, ], title: "CVE-2023-2183", }, { cve: "CVE-2023-2801", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2801", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-2801", url: "https://www.suse.com/security/cve/CVE-2023-2801", }, { category: "external", summary: "SUSE Bug 1212099 for CVE-2023-2801", url: "https://bugzilla.suse.com/1212099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "important", }, ], title: "CVE-2023-2801", }, { cve: "CVE-2023-3128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3128", }, ], notes: [ { category: "general", text: "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. \n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-3128", url: "https://www.suse.com/security/cve/CVE-2023-3128", }, { category: "external", summary: "SUSE Bug 1212641 for CVE-2023-3128", url: "https://bugzilla.suse.com/1212641", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.4, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2024-01-23T15:20:05Z", details: "critical", }, ], title: "CVE-2023-3128", }, ], }
suse-su-2023:0353-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SUSE Manager Client Tools", title: "Title of the patch", }, { category: "description", text: "\nThis update fixes the following issues:\n\ndracut-saltboot:\n\n- Update to version 0.1.1673279145.e7616bd \n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n * Copy existing wicked config instead of generating new (bsc#1205599)\n \ngrafana:\n\n- Update to version 8.5.15 (jsc#PED-2617):\n * CVE-2022-39306: Fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not exists (bsc#1205227)\n- Update to version 8.5.14:\n * CVE-2022-39201: Fix do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocknig other users from signing in (bsc#1204304)\n \nmgr-osad:\n\n- Version 4.3.7-1\n * Updated logrotate configuration (bsc#1206470)\n\nmgr-push:\n\n- Version 4.3.5-1\n * Update translation strings\n\nrhnlib:\n\n- Version 4.3.5-1\n * Don't get stuck at the end of SSL transfers (bsc#1204032)\n\nspacecmd:\n\n- Version 4.3.18-1\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n- Version 4.3.17-1\n * Remove python3-simplejson dependency\n * Correctly understand 'ssm' keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Change default port of 'Containerized Proxy configuration' 8022\n\nspacewalk-client-tools:\n\n- Version 4.3.14-1\n * Update translation strings\n\nuyuni-common-libs:\n\n- Version 4.3.7-1\n * unify user notification code on java side\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-353,SUSE-SLE-Manager-Tools-15-2023-353,SUSE-SLE-Manager-Tools-For-Micro-5-2023-353,openSUSE-SLE-15.4-2023-353", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0353-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0353-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230353-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0353-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html", }, { category: "self", summary: "SUSE Bug 1172110", url: "https://bugzilla.suse.com/1172110", }, { category: "self", summary: "SUSE Bug 1204032", url: "https://bugzilla.suse.com/1204032", }, { category: "self", summary: "SUSE Bug 1204126", url: "https://bugzilla.suse.com/1204126", }, { category: "self", summary: "SUSE Bug 1204302", url: "https://bugzilla.suse.com/1204302", }, { category: "self", summary: "SUSE Bug 1204303", url: "https://bugzilla.suse.com/1204303", }, { category: "self", summary: "SUSE Bug 1204304", url: "https://bugzilla.suse.com/1204304", }, { category: "self", summary: "SUSE Bug 1204305", url: "https://bugzilla.suse.com/1204305", }, { category: "self", summary: "SUSE Bug 1205207", url: "https://bugzilla.suse.com/1205207", }, { category: "self", summary: "SUSE Bug 1205225", url: "https://bugzilla.suse.com/1205225", }, { category: "self", summary: "SUSE Bug 1205227", url: "https://bugzilla.suse.com/1205227", }, { category: "self", summary: "SUSE Bug 1205599", url: "https://bugzilla.suse.com/1205599", }, { category: "self", summary: "SUSE Bug 1206470", url: "https://bugzilla.suse.com/1206470", }, { category: "self", summary: "SUSE CVE CVE-2022-31123 page", url: "https://www.suse.com/security/cve/CVE-2022-31123/", }, { category: "self", summary: "SUSE CVE CVE-2022-31130 page", url: "https://www.suse.com/security/cve/CVE-2022-31130/", }, { category: "self", summary: "SUSE CVE CVE-2022-39201 page", url: "https://www.suse.com/security/cve/CVE-2022-39201/", }, { category: "self", summary: "SUSE CVE CVE-2022-39229 page", url: "https://www.suse.com/security/cve/CVE-2022-39229/", }, { category: "self", summary: "SUSE CVE CVE-2022-39306 page", url: "https://www.suse.com/security/cve/CVE-2022-39306/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, ], title: "Security update for SUSE Manager Client Tools", tracking: { current_release_date: "2023-02-10T14:12:55Z", generator: { date: "2023-02-10T14:12:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0353-1", initial_release_date: "2023-02-10T14:12:55Z", revision_history: [ { date: "2023-02-10T14:12:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "grafana-8.5.15-150000.1.39.1.aarch64", product: { name: "grafana-8.5.15-150000.1.39.1.aarch64", product_id: "grafana-8.5.15-150000.1.39.1.aarch64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", product: { name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", product_id: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", }, }, { category: "product_version", name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", product: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", product_id: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150000.1.39.1.i586", product: { name: "grafana-8.5.15-150000.1.39.1.i586", product_id: "grafana-8.5.15-150000.1.39.1.i586", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.i586", product: { name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.i586", product_id: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.i586", }, }, { category: "product_version", name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.i586", product: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.i586", product_id: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", product: { name: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", product_id: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", }, }, { category: "product_version", name: "mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", product: { name: "mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", product_id: "mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", }, }, { category: "product_version", name: "mgr-osad-4.3.7-150000.1.42.1.noarch", product: { name: "mgr-osad-4.3.7-150000.1.42.1.noarch", product_id: "mgr-osad-4.3.7-150000.1.42.1.noarch", }, }, { category: "product_version", name: "mgr-push-4.3.5-150000.1.24.2.noarch", product: { name: "mgr-push-4.3.5-150000.1.24.2.noarch", product_id: "mgr-push-4.3.5-150000.1.24.2.noarch", }, }, { category: "product_version", name: "python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", product: { name: "python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", product_id: "python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", }, }, { category: "product_version", name: "python3-mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", product: { name: "python3-mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", product_id: "python3-mgr-osa-dispatcher-4.3.7-150000.1.42.1.noarch", }, }, { category: "product_version", name: "python3-mgr-osad-4.3.7-150000.1.42.1.noarch", product: { name: "python3-mgr-osad-4.3.7-150000.1.42.1.noarch", product_id: "python3-mgr-osad-4.3.7-150000.1.42.1.noarch", }, }, { category: "product_version", name: "python3-mgr-push-4.3.5-150000.1.24.2.noarch", product: { name: "python3-mgr-push-4.3.5-150000.1.24.2.noarch", product_id: "python3-mgr-push-4.3.5-150000.1.24.2.noarch", }, }, { category: "product_version", name: "python3-rhnlib-4.3.5-150000.3.40.1.noarch", product: { name: "python3-rhnlib-4.3.5-150000.3.40.1.noarch", product_id: "python3-rhnlib-4.3.5-150000.3.40.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", product: { name: "python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", product_id: "python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", product: { name: "python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", product_id: "python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", }, }, { category: "product_version", name: "python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", product: { name: "python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", product_id: "python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", }, }, { category: "product_version", name: "spacecmd-4.3.18-150000.3.92.1.noarch", product: { name: "spacecmd-4.3.18-150000.3.92.1.noarch", product_id: "spacecmd-4.3.18-150000.3.92.1.noarch", }, }, { category: "product_version", name: "spacewalk-check-4.3.14-150000.3.74.1.noarch", product: { name: "spacewalk-check-4.3.14-150000.3.74.1.noarch", product_id: "spacewalk-check-4.3.14-150000.3.74.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", product: { name: "spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", product_id: "spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", }, }, { category: "product_version", name: "spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", product: { name: "spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", product_id: "spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150000.1.39.1.ppc64le", product: { name: "grafana-8.5.15-150000.1.39.1.ppc64le", product_id: "grafana-8.5.15-150000.1.39.1.ppc64le", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", product: { name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", product_id: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", }, }, { category: "product_version", name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", product: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", product_id: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150000.1.39.1.s390x", product: { name: "grafana-8.5.15-150000.1.39.1.s390x", product_id: "grafana-8.5.15-150000.1.39.1.s390x", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", product: { name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", product_id: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", }, }, { category: "product_version", name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", product: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", product_id: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-150000.1.39.1.x86_64", product: { name: "grafana-8.5.15-150000.1.39.1.x86_64", product_id: "grafana-8.5.15-150000.1.39.1.x86_64", }, }, { category: "product_version", name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", product: { name: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", product_id: "python2-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", }, }, { category: "product_version", name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", product: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", product_id: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Manager Client Tools 15", product: { name: "SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15", }, }, { category: "product_name", name: "SUSE Manager Client Tools for SLE Micro 5", product: { name: "SUSE Manager Client Tools for SLE Micro 5", product_id: "SUSE Manager Client Tools for SLE Micro 5", product_identification_helper: { cpe: "cpe:/o:suse:sle-manager-tools-micro:5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", }, product_reference: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150000.1.39.1.aarch64 as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", }, product_reference: "grafana-8.5.15-150000.1.39.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150000.1.39.1.ppc64le as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", }, product_reference: "grafana-8.5.15-150000.1.39.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150000.1.39.1.s390x as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", }, product_reference: "grafana-8.5.15-150000.1.39.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-150000.1.39.1.x86_64 as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", }, product_reference: "grafana-8.5.15-150000.1.39.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "mgr-osad-4.3.7-150000.1.42.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", }, product_reference: "mgr-osad-4.3.7-150000.1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "mgr-push-4.3.5-150000.1.24.2.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", }, product_reference: "mgr-push-4.3.5-150000.1.24.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", }, product_reference: "python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-mgr-osad-4.3.7-150000.1.42.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", }, product_reference: "python3-mgr-osad-4.3.7-150000.1.42.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-mgr-push-4.3.5-150000.1.24.2.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", }, product_reference: "python3-mgr-push-4.3.5-150000.1.24.2.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-rhnlib-4.3.5-150000.3.40.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", }, product_reference: "python3-rhnlib-4.3.5-150000.3.40.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-check-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", }, product_reference: "python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", }, product_reference: "python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", }, product_reference: "python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64 as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", }, product_reference: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", }, product_reference: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", }, product_reference: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64 as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", }, product_reference: "python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "spacecmd-4.3.18-150000.3.92.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", }, product_reference: "spacecmd-4.3.18-150000.3.92.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "spacewalk-check-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", }, product_reference: "spacewalk-check-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-setup-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", }, product_reference: "spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "spacewalk-client-tools-4.3.14-150000.3.74.1.noarch as component of SUSE Manager Client Tools 15", product_id: "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", }, product_reference: "spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools 15", }, { category: "default_component_of", full_product_name: { name: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5", product_id: "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", }, product_reference: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", relates_to_product_reference: "SUSE Manager Client Tools for SLE Micro 5", }, { category: "default_component_of", full_product_name: { name: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", }, product_reference: "dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "spacecmd-4.3.18-150000.3.92.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", }, product_reference: "spacecmd-4.3.18-150000.3.92.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-31123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31123", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31123", url: "https://www.suse.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "SUSE Bug 1204302 for CVE-2022-31123", url: "https://bugzilla.suse.com/1204302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "low", }, ], title: "CVE-2022-31123", }, { cve: "CVE-2022-31130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31130", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-31130", url: "https://www.suse.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "SUSE Bug 1204305 for CVE-2022-31130", url: "https://bugzilla.suse.com/1204305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "moderate", }, ], title: "CVE-2022-31130", }, { cve: "CVE-2022-39201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39201", }, ], notes: [ { category: "general", text: "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39201", url: "https://www.suse.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "SUSE Bug 1204303 for CVE-2022-39201", url: "https://bugzilla.suse.com/1204303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "moderate", }, ], title: "CVE-2022-39201", }, { cve: "CVE-2022-39229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39229", }, ], notes: [ { category: "general", text: "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39229", url: "https://www.suse.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "SUSE Bug 1204304 for CVE-2022-39229", url: "https://bugzilla.suse.com/1204304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "low", }, ], title: "CVE-2022-39229", }, { cve: "CVE-2022-39306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39306", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39306", url: "https://www.suse.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "SUSE Bug 1205225 for CVE-2022-39306", url: "https://bugzilla.suse.com/1205225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "moderate", }, ], title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.s390x", "SUSE Manager Client Tools 15:grafana-8.5.15-150000.1.39.1.x86_64", "SUSE Manager Client Tools 15:mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.3.7-150000.1.42.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.3.5-150000.1.24.2.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.3.5-150000.3.40.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.7-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:spacecmd-4.3.18-150000.3.92.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.14-150000.3.74.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1673279145.e7616bd-150000.1.44.1.noarch", "openSUSE Leap 15.4:spacecmd-4.3.18-150000.3.92.1.noarch", ], }, ], threats: [ { category: "impact", date: "2023-02-10T14:12:55Z", details: "moderate", }, ], title: "CVE-2022-39307", }, ], }
rhsa-2023_6420
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. \n\nSecurity Fix(es):\n\n* grafana: persistent xss in grafana core plugins (CVE-2022-23552)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:6420", url: "https://access.redhat.com/errata/RHSA-2023:6420", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "2188193", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188193", }, { category: "external", summary: "2193018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2193018", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6420.json", }, ], title: "Red Hat Security Advisory: grafana security and enhancement update", tracking: { current_release_date: "2024-12-17T22:26:37+00:00", generator: { date: "2024-12-17T22:26:37+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2023:6420", initial_release_date: "2023-11-07T08:59:06+00:00", revision_history: [ { date: "2023-11-07T08:59:06+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-07T08:59:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:26:37+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.src", product: { name: "grafana-0:9.2.10-7.el9_3.src", product_id: "grafana-0:9.2.10-7.el9_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-0:9.2.10-7.el9_3.s390x", product_id: "grafana-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", }, product_reference: "grafana-0:9.2.10-7.el9_3.src", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Grafana Security Team", ], }, ], cve: "CVE-2022-23552", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2023-01-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2158420", }, ], notes: [ { category: "description", text: "A flaw was found in The GeoMap and Canvas plugins of Grafana. The GeoMap and Canvas plugins are core plugins in Grafana, which means that all Grafana instances have GeoMap and Canvas installed. These two plugins are vulnerable to Cross-site scripting, where an attacker with an Editor role can add an SVG file containing malicious JavaScript code. The Javascript is executed when a user with an admin role later edits the GeoMap/Canvas panel.", title: "Vulnerability description", }, { category: "summary", text: "grafana: persistent xss in grafana core plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23552", }, { category: "external", summary: "RHBZ#2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23552", url: "https://www.cve.org/CVERecord?id=CVE-2022-23552", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-27T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: persistent xss in grafana core plugins", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { cve: "CVE-2022-41717", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2023-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2161274", }, ], notes: [ { category: "description", text: "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", title: "Vulnerability summary", }, { category: "other", text: "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41717", }, { category: "external", summary: "RHBZ#2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41717", url: "https://www.cve.org/CVERecord?id=CVE-2022-41717", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", }, { category: "external", summary: "https://go.dev/cl/455635", url: "https://go.dev/cl/455635", }, { category: "external", summary: "https://go.dev/cl/455717", url: "https://go.dev/cl/455717", }, { category: "external", summary: "https://go.dev/issue/56350", url: "https://go.dev/issue/56350", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", url: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2022-1144", url: "https://pkg.go.dev/vuln/GO-2022-1144", }, ], release_date: "2022-11-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", }, { cve: "CVE-2023-24534", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-04-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2184483", }, ], notes: [ { category: "description", text: "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, net/textproto: denial of service from excessive memory allocation", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-24534", }, { category: "external", summary: "RHBZ#2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-24534", url: "https://www.cve.org/CVERecord?id=CVE-2023-24534", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", }, { category: "external", summary: "https://go.dev/issue/58975", url: "https://go.dev/issue/58975", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", url: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", }, ], release_date: "2023-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http, net/textproto: denial of service from excessive memory allocation", }, ], }
rhsa-2023:3642
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9.\n\nSecurity Fix(es):\n\n* crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* grafana: stored XSS vulnerability (CVE-2022-31097)\n\n* grafana: OAuth account takeover (CVE-2022-31107)\n\n* ramda: prototype poisoning (CVE-2021-42581)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* marked: regular expression block.def may lead Denial of Service (CVE-2022-21680)\n\n* marked: regular expression inline.reflinkSearch may lead Denial of Service (CVE-2022-21681)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix (CVE-2022-26148)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* grafana: Escalation from admin to server admin when auth proxy is used (CVE-2022-35957)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: using email as a username can block other users from signing in (CVE-2022-39229)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:3642", url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", }, { category: "external", summary: "2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "2168965", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2168965", }, { category: "external", summary: "2174461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174461", }, { category: "external", summary: "2174462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174462", }, { category: "external", summary: "2186142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2186142", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3642.json", }, ], title: "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update", tracking: { current_release_date: "2025-03-20T12:54:20+00:00", generator: { date: "2025-03-20T12:54:20+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2023:3642", initial_release_date: "2023-06-15T15:59:41+00:00", revision_history: [ { date: "2023-06-15T15:59:41+00:00", number: "1", summary: "Initial version", }, { date: "2023-06-15T15:59:41+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T12:54:20+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Ceph Storage 6.1 Tools", product: { name: "Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools", product_identification_helper: { cpe: "cpe:/a:redhat:ceph_storage:6.1::el9", }, }, }, ], category: "product_family", name: "Red Hat Ceph Storage", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_id: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a?arch=amd64&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_id: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_id: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_id: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661?arch=amd64&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "amd64", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_id: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22?arch=ppc64le&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_id: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_id: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_id: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676?arch=ppc64le&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_id: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97?arch=s390x&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_id: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_id: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_id: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf?arch=s390x&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", }, product_reference: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", }, product_reference: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", }, product_reference: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, ], }, vulnerabilities: [ { cve: "CVE-2021-42581", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-05-10T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083778", }, ], notes: [ { category: "description", text: "A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application.", title: "Vulnerability description", }, { category: "summary", text: "ramda: prototype poisoning", title: "Vulnerability summary", }, { category: "other", text: "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are the application-ui container up to and including RHACM 2.4.4, 2.3.10 and 2.2.13 and grc-ui container up to and including RHACM 2.2.13 versions. However not any RHACM is affected in the kui-web-terminal container as is using already patched and not affected version, therefore we are not impacted in this particular component. In RHACM these components are behind OpenShift OAuth. This restricts access to the vulnerable ramda library to authenticated users only, therefore the impact is reduced to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-42581", }, { category: "external", summary: "RHBZ#2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-42581", url: "https://www.cve.org/CVERecord?id=CVE-2021-42581", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", }, { category: "external", summary: "https://github.com/ramda/ramda/pull/3192", url: "https://github.com/ramda/ramda/pull/3192", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ramda: prototype poisoning", }, { cve: "CVE-2022-1650", cwe: { id: "CWE-359", name: "Exposure of Private Personal Information to an Unauthorized Actor", }, discovery_date: "2022-05-12T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2085307", }, ], notes: [ { category: "description", text: "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user's credentials and then use the credentials to access the legitimate website.", title: "Vulnerability description", }, { category: "summary", text: "eventsource: Exposure of Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1650", }, { category: "external", summary: "RHBZ#2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1650", url: "https://www.cve.org/CVERecord?id=CVE-2022-1650", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", }, { category: "external", summary: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", url: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", }, ], release_date: "2022-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "eventsource: Exposure of Sensitive Information", }, { cve: "CVE-2022-1705", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107374", }, ], notes: [ { category: "description", text: "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: improper sanitization of Transfer-Encoding header", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1705", }, { category: "external", summary: "RHBZ#2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1705", url: "https://www.cve.org/CVERecord?id=CVE-2022-1705", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", }, { category: "external", summary: "https://go.dev/issue/53188", url: "https://go.dev/issue/53188", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: improper sanitization of Transfer-Encoding header", }, { acknowledgments: [ { names: [ "Daniel Abeles", ], organization: "Head of Research, Oxeye", }, { names: [ "Gal Goldstein", ], organization: "Security Researcher, Oxeye", }, ], cve: "CVE-2022-2880", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132868", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request's form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", title: "Vulnerability summary", }, { category: "other", text: "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-2880", }, { category: "external", summary: "RHBZ#2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-2880", url: "https://www.cve.org/CVERecord?id=CVE-2022-2880", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", }, { category: "external", summary: "https://github.com/golang/go/issues/54663", url: "https://github.com/golang/go/issues/54663", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", }, { cve: "CVE-2022-21680", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082705", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression block.def may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21680", }, { category: "external", summary: "RHBZ#2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21680", url: "https://www.cve.org/CVERecord?id=CVE-2022-21680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression block.def may lead Denial of Service", }, { cve: "CVE-2022-21681", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082706", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression inline.reflinkSearch may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21681", }, { category: "external", summary: "RHBZ#2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21681", url: "https://www.cve.org/CVERecord?id=CVE-2022-21681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression inline.reflinkSearch may lead Denial of Service", }, { cve: "CVE-2022-23498", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2023-02-06T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2167266", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana package. When data-source query caching is enabled, Grafana caches all headers, including `grafana_session.` As a result, any user that queries a data source where the caching is enabled can acquire another user’s session.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Use of Cache Containing Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23498", }, { category: "external", summary: "RHBZ#2167266", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167266", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23498", url: "https://www.cve.org/CVERecord?id=CVE-2022-23498", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", }, ], release_date: "2023-02-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "To mitigate the vulnerability, disable the data source query caching for all data sources.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: Use of Cache Containing Sensitive Information", }, { cve: "CVE-2022-24675", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077688", }, ], notes: [ { category: "description", text: "A buffer overflow flaw was found in Golang's library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/pem: fix stack overflow in Decode", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24675", }, { category: "external", summary: "RHBZ#2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24675", url: "https://www.cve.org/CVERecord?id=CVE-2022-24675", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/pem: fix stack overflow in Decode", }, { cve: "CVE-2022-24785", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-04-05T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2072009", }, ], notes: [ { category: "description", text: "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", title: "Vulnerability description", }, { category: "summary", text: "Moment.js: Path traversal in moment.locale", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24785", }, { category: "external", summary: "RHBZ#2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24785", url: "https://www.cve.org/CVERecord?id=CVE-2022-24785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", }, { category: "external", summary: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", url: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", }, ], release_date: "2022-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Sanitize the user-provided locale name before passing it to Moment.js.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Moment.js: Path traversal in moment.locale", }, { cve: "CVE-2022-26148", cwe: { id: "CWE-312", name: "Cleartext Storage of Sensitive Information", }, discovery_date: "2022-03-22T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066563", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right-click to view the source code and use Ctrl-F to search for the password in api_jsonrpc.php to discover the Zabbix account password and URL address.", title: "Vulnerability description", }, { category: "summary", text: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26148", }, { category: "external", summary: "RHBZ#2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26148", url: "https://www.cve.org/CVERecord?id=CVE-2022-26148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", }, ], release_date: "2022-03-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", }, { cve: "CVE-2022-27664", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124669", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: handle server errors after sending GOAWAY", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-27664", }, { category: "external", summary: "RHBZ#2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-27664", url: "https://www.cve.org/CVERecord?id=CVE-2022-27664", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", }, { category: "external", summary: "https://go.dev/issue/54658", url: "https://go.dev/issue/54658", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: handle server errors after sending GOAWAY", }, { cve: "CVE-2022-28131", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107390", }, ], notes: [ { category: "description", text: "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Decoder.Skip", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28131", }, { category: "external", summary: "RHBZ#2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28131", url: "https://www.cve.org/CVERecord?id=CVE-2022-28131", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", }, { category: "external", summary: "https://go.dev/issue/53614", url: "https://go.dev/issue/53614", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Decoder.Skip", }, { cve: "CVE-2022-28327", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077689", }, ], notes: [ { category: "description", text: "An integer overflow flaw was found in Golang's crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/elliptic: panic caused by oversized scalar", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28327", }, { category: "external", summary: "RHBZ#2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28327", url: "https://www.cve.org/CVERecord?id=CVE-2022-28327", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: crypto/elliptic: panic caused by oversized scalar", }, { acknowledgments: [ { names: [ "Joël Gähwiler", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-29526", cwe: { id: "CWE-280", name: "Improper Handling of Insufficient Permissions or Privileges ", }, discovery_date: "2022-05-11T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2084085", }, ], notes: [ { category: "description", text: "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file's group, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: syscall: faccessat checks wrong group", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29526", }, { category: "external", summary: "RHBZ#2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29526", url: "https://www.cve.org/CVERecord?id=CVE-2022-29526", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", url: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", }, ], release_date: "2022-05-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.2, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: syscall: faccessat checks wrong group", }, { cve: "CVE-2022-30629", cwe: { id: "CWE-331", name: "Insufficient Entropy", }, discovery_date: "2022-06-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2092793", }, ], notes: [ { category: "description", text: "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/tls: session tickets lack random ticket_age_add", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30629", }, { category: "external", summary: "RHBZ#2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30629", url: "https://www.cve.org/CVERecord?id=CVE-2022-30629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", url: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", }, ], release_date: "2022-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.1, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: crypto/tls: session tickets lack random ticket_age_add", }, { cve: "CVE-2022-30630", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107371", }, ], notes: [ { category: "description", text: "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: io/fs: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "other", text: "RH ProdSec has set the Impact of this vulnerability to Moderate as there is no known method to execute arbitary code. Successful exploitation of this bug can cause the application under attack to panic, merely causing a Denial of Service at the application level. As the kernel is unaffected by this bug, the user can merely relaunch the application to fix the problem. Also, if somehow the application keeps relaunching, the timer watchdogs in the default RHEL kernel will stop the attack in its tracks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30630", }, { category: "external", summary: "RHBZ#2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30630", url: "https://www.cve.org/CVERecord?id=CVE-2022-30630", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", }, { category: "external", summary: "https://go.dev/issue/53415", url: "https://go.dev/issue/53415", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: io/fs: stack exhaustion in Glob", }, { cve: "CVE-2022-30631", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107342", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: compress/gzip: stack exhaustion in Reader.Read", title: "Vulnerability summary", }, { category: "other", text: "To exploit CVE-2022-30631, an attacker supplies a specially crafted gzip archive to a Go application that uses a vulnerable version of the compress/gzip package without adequate input validation. This can lead to uncontrolled recursion, resulting in stack exhaustion and causing the application to panic, thereby affecting its availability.\n\nAs this is merely a DoS and there is no known way to control the instruction pointer, RH ProdSec has set the impact of this vulnerabilty to \"Moderate\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30631", }, { category: "external", summary: "RHBZ#2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30631", url: "https://www.cve.org/CVERecord?id=CVE-2022-30631", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", }, { category: "external", summary: "https://go.dev/issue/53168", url: "https://go.dev/issue/53168", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: compress/gzip: stack exhaustion in Reader.Read", }, { cve: "CVE-2022-30632", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107386", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: path/filepath: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "other", text: "The exploitation of this flaw will only result in a denial of service of the application via the application crashing which is why this has been rated as moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30632", }, { category: "external", summary: "RHBZ#2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30632", url: "https://www.cve.org/CVERecord?id=CVE-2022-30632", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", }, { category: "external", summary: "https://go.dev/issue/53416", url: "https://go.dev/issue/53416", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: path/filepath: stack exhaustion in Glob", }, { cve: "CVE-2022-30633", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107392", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Unmarshal", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30633", }, { category: "external", summary: "RHBZ#2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30633", url: "https://www.cve.org/CVERecord?id=CVE-2022-30633", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", }, { category: "external", summary: "https://go.dev/issue/53611", url: "https://go.dev/issue/53611", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Unmarshal", }, { cve: "CVE-2022-30635", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107388", }, ], notes: [ { category: "description", text: "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/gob: stack exhaustion in Decoder.Decode", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.The vulnerability has been rated as moderate instead of high because the vulnerability can only result in a minor denial of service.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30635", }, { category: "external", summary: "RHBZ#2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30635", url: "https://www.cve.org/CVERecord?id=CVE-2022-30635", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", }, { category: "external", summary: "https://go.dev/issue/53615", url: "https://go.dev/issue/53615", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/gob: stack exhaustion in Decoder.Decode", }, { cve: "CVE-2022-31097", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104365", }, ], notes: [ { category: "description", text: "A Cross-site scripting (XSS) vulnerability was found in the Unified Alerting feature of Grafana. This stored XSS can elevate privileges from Editor to Admin.", title: "Vulnerability description", }, { category: "summary", text: "grafana: stored XSS vulnerability", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31097", }, { category: "external", summary: "RHBZ#2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31097", url: "https://www.cve.org/CVERecord?id=CVE-2022-31097", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", url: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Disable Unified alerting.\nhttps://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#unified_alerting", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: stored XSS vulnerability", }, { acknowledgments: [ { names: [ "HTTPVoid team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-31107", cwe: { id: "CWE-287", name: "Improper Authentication", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104367", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. This flaw allows a malicious user with the authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under certain conditions.", title: "Vulnerability description", }, { category: "summary", text: "grafana: OAuth account takeover", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31107", }, { category: "external", summary: "RHBZ#2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31107", url: "https://www.cve.org/CVERecord?id=CVE-2022-31107", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", url: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "As a workaround, it is possible to disable any OAuth login or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: OAuth account takeover", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-32148", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107383", }, ], notes: [ { category: "description", text: "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32148", }, { category: "external", summary: "RHBZ#2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32148", url: "https://www.cve.org/CVERecord?id=CVE-2022-32148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", }, { category: "external", summary: "https://go.dev/issue/53423", url: "https://go.dev/issue/53423", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", }, { cve: "CVE-2022-32189", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-08-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2113814", }, ], notes: [ { category: "description", text: "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", title: "Vulnerability summary", }, { category: "other", text: "This flaw stems from a particular and specific method (GoBDecode) which isn't commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32189", }, { category: "external", summary: "RHBZ#2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32189", url: "https://www.cve.org/CVERecord?id=CVE-2022-32189", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", }, { category: "external", summary: "https://go.dev/issue/53871", url: "https://go.dev/issue/53871", }, { category: "external", summary: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", url: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", }, ], release_date: "2022-08-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", }, { cve: "CVE-2022-32190", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124668", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. The JoinPath doesn't remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/url: JoinPath does not strip relative path components in all circumstances", title: "Vulnerability summary", }, { category: "other", text: "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32190", }, { category: "external", summary: "RHBZ#2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32190", url: "https://www.cve.org/CVERecord?id=CVE-2022-32190", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", }, { category: "external", summary: "https://go.dev/issue/54385", url: "https://go.dev/issue/54385", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/url: JoinPath does not strip relative path components in all circumstances", }, { cve: "CVE-2022-35957", cwe: { id: "CWE-288", name: "Authentication Bypass Using an Alternate Path or Channel", }, discovery_date: "2022-09-09T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2125514", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. Auth proxy allows authentication of a user by only providing the username (or email) in an X-WEBAUTH-USER HTTP header. The trust assumption is that a front proxy will take care of authentication and that the Grafana server is only publicly reachable with this front proxy.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Escalation from admin to server admin when auth proxy is used", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-35957", }, { category: "external", summary: "RHBZ#2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-35957", url: "https://www.cve.org/CVERecord?id=CVE-2022-35957", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", url: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", }, ], release_date: "2022-09-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Escalation from admin to server admin when auth proxy is used", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { cve: "CVE-2022-39229", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131149", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application. When a user logs into the system, either the username or email address can be used. However, the login system allows both a username and connected email to be registered, which could allow an attacker to prevent a user which has an associated email address access.", title: "Vulnerability description", }, { category: "summary", text: "grafana: using email as a username can block other users from signing in", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "RHBZ#2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39229", url: "https://www.cve.org/CVERecord?id=CVE-2022-39229", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: using email as a username can block other users from signing in", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { acknowledgments: [ { names: [ "Adam Korczynski", ], organization: "ADA Logics", }, { names: [ "OSS-Fuzz", ], }, ], cve: "CVE-2022-41715", discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132872", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", title: "Vulnerability description", }, { category: "summary", text: "golang: regexp/syntax: limit memory used by parsing regexps", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41715", }, { category: "external", summary: "RHBZ#2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41715", url: "https://www.cve.org/CVERecord?id=CVE-2022-41715", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", }, { category: "external", summary: "https://github.com/golang/go/issues/55949", url: "https://github.com/golang/go/issues/55949", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: regexp/syntax: limit memory used by parsing regexps", }, { cve: "CVE-2022-41912", cwe: { id: "CWE-165", name: "Improper Neutralization of Multiple Internal Special Elements", }, discovery_date: "2022-11-29T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2149181", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in the crewjam/saml go package. A remote unauthenticated attacker could trigger it by sending a SAML request. This would allow an escalation of privileges and then enable compromising system integrity.", title: "Vulnerability description", }, { category: "summary", text: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", title: "Vulnerability summary", }, { category: "other", text: "Whilst the Red Hat Advanced Cluster Management for Kubernetes (RHACM) acm-grafana container include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nThe OCP grafana-container includes the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nWhile Red Hat Ceph Storage 4's grafana-container includes the affected code, this is used for logging and limits access to the rest of the Ceph cluster. Thus the impact has been reduced from critical to important. Red Hat Ceph Storage 3 and 4 do not use crewjam/saml in their version of grafana.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41912", }, { category: "external", summary: "RHBZ#2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41912", url: "https://www.cve.org/CVERecord?id=CVE-2022-41912", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", }, { category: "external", summary: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", url: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", }, ], release_date: "2022-11-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", }, ], }
RHSA-2023:6420
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. \n\nSecurity Fix(es):\n\n* grafana: persistent xss in grafana core plugins (CVE-2022-23552)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:6420", url: "https://access.redhat.com/errata/RHSA-2023:6420", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "2188193", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188193", }, { category: "external", summary: "2193018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2193018", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6420.json", }, ], title: "Red Hat Security Advisory: grafana security and enhancement update", tracking: { current_release_date: "2025-03-20T13:35:54+00:00", generator: { date: "2025-03-20T13:35:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2023:6420", initial_release_date: "2023-11-07T08:59:06+00:00", revision_history: [ { date: "2023-11-07T08:59:06+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-07T08:59:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T13:35:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.src", product: { name: "grafana-0:9.2.10-7.el9_3.src", product_id: "grafana-0:9.2.10-7.el9_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-0:9.2.10-7.el9_3.s390x", product_id: "grafana-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", }, product_reference: "grafana-0:9.2.10-7.el9_3.src", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Grafana Security Team", ], }, ], cve: "CVE-2022-23552", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2023-01-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2158420", }, ], notes: [ { category: "description", text: "A flaw was found in The GeoMap and Canvas plugins of Grafana. The GeoMap and Canvas plugins are core plugins in Grafana, which means that all Grafana instances have GeoMap and Canvas installed. These two plugins are vulnerable to Cross-site scripting, where an attacker with an Editor role can add an SVG file containing malicious JavaScript code. The Javascript is executed when a user with an admin role later edits the GeoMap/Canvas panel.", title: "Vulnerability description", }, { category: "summary", text: "grafana: persistent xss in grafana core plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23552", }, { category: "external", summary: "RHBZ#2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23552", url: "https://www.cve.org/CVERecord?id=CVE-2022-23552", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-27T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: persistent xss in grafana core plugins", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { cve: "CVE-2022-41717", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2023-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2161274", }, ], notes: [ { category: "description", text: "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", title: "Vulnerability summary", }, { category: "other", text: "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41717", }, { category: "external", summary: "RHBZ#2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41717", url: "https://www.cve.org/CVERecord?id=CVE-2022-41717", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", }, { category: "external", summary: "https://go.dev/cl/455635", url: "https://go.dev/cl/455635", }, { category: "external", summary: "https://go.dev/cl/455717", url: "https://go.dev/cl/455717", }, { category: "external", summary: "https://go.dev/issue/56350", url: "https://go.dev/issue/56350", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", url: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2022-1144", url: "https://pkg.go.dev/vuln/GO-2022-1144", }, ], release_date: "2022-11-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", }, { cve: "CVE-2023-24534", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-04-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2184483", }, ], notes: [ { category: "description", text: "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, net/textproto: denial of service from excessive memory allocation", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-24534", }, { category: "external", summary: "RHBZ#2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-24534", url: "https://www.cve.org/CVERecord?id=CVE-2023-24534", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", }, { category: "external", summary: "https://go.dev/issue/58975", url: "https://go.dev/issue/58975", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", url: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", }, ], release_date: "2023-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http, net/textproto: denial of service from excessive memory allocation", }, ], }
RHSA-2023:3642
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9.\n\nSecurity Fix(es):\n\n* crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* grafana: stored XSS vulnerability (CVE-2022-31097)\n\n* grafana: OAuth account takeover (CVE-2022-31107)\n\n* ramda: prototype poisoning (CVE-2021-42581)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* marked: regular expression block.def may lead Denial of Service (CVE-2022-21680)\n\n* marked: regular expression inline.reflinkSearch may lead Denial of Service (CVE-2022-21681)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix (CVE-2022-26148)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* grafana: Escalation from admin to server admin when auth proxy is used (CVE-2022-35957)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: using email as a username can block other users from signing in (CVE-2022-39229)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:3642", url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", }, { category: "external", summary: "2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "2168965", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2168965", }, { category: "external", summary: "2174461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174461", }, { category: "external", summary: "2174462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174462", }, { category: "external", summary: "2186142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2186142", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3642.json", }, ], title: "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update", tracking: { current_release_date: "2025-03-20T12:54:20+00:00", generator: { date: "2025-03-20T12:54:20+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2023:3642", initial_release_date: "2023-06-15T15:59:41+00:00", revision_history: [ { date: "2023-06-15T15:59:41+00:00", number: "1", summary: "Initial version", }, { date: "2023-06-15T15:59:41+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T12:54:20+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Ceph Storage 6.1 Tools", product: { name: "Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools", product_identification_helper: { cpe: "cpe:/a:redhat:ceph_storage:6.1::el9", }, }, }, ], category: "product_family", name: "Red Hat Ceph Storage", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_id: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a?arch=amd64&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_id: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_id: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_id: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661?arch=amd64&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "amd64", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_id: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22?arch=ppc64le&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_id: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_id: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_id: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676?arch=ppc64le&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_id: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97?arch=s390x&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_id: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_id: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_id: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf?arch=s390x&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", }, product_reference: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", }, product_reference: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", }, product_reference: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, ], }, vulnerabilities: [ { cve: "CVE-2021-42581", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-05-10T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083778", }, ], notes: [ { category: "description", text: "A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application.", title: "Vulnerability description", }, { category: "summary", text: "ramda: prototype poisoning", title: "Vulnerability summary", }, { category: "other", text: "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are the application-ui container up to and including RHACM 2.4.4, 2.3.10 and 2.2.13 and grc-ui container up to and including RHACM 2.2.13 versions. However not any RHACM is affected in the kui-web-terminal container as is using already patched and not affected version, therefore we are not impacted in this particular component. In RHACM these components are behind OpenShift OAuth. This restricts access to the vulnerable ramda library to authenticated users only, therefore the impact is reduced to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-42581", }, { category: "external", summary: "RHBZ#2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-42581", url: "https://www.cve.org/CVERecord?id=CVE-2021-42581", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", }, { category: "external", summary: "https://github.com/ramda/ramda/pull/3192", url: "https://github.com/ramda/ramda/pull/3192", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ramda: prototype poisoning", }, { cve: "CVE-2022-1650", cwe: { id: "CWE-359", name: "Exposure of Private Personal Information to an Unauthorized Actor", }, discovery_date: "2022-05-12T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2085307", }, ], notes: [ { category: "description", text: "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user's credentials and then use the credentials to access the legitimate website.", title: "Vulnerability description", }, { category: "summary", text: "eventsource: Exposure of Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1650", }, { category: "external", summary: "RHBZ#2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1650", url: "https://www.cve.org/CVERecord?id=CVE-2022-1650", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", }, { category: "external", summary: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", url: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", }, ], release_date: "2022-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "eventsource: Exposure of Sensitive Information", }, { cve: "CVE-2022-1705", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107374", }, ], notes: [ { category: "description", text: "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: improper sanitization of Transfer-Encoding header", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1705", }, { category: "external", summary: "RHBZ#2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1705", url: "https://www.cve.org/CVERecord?id=CVE-2022-1705", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", }, { category: "external", summary: "https://go.dev/issue/53188", url: "https://go.dev/issue/53188", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: improper sanitization of Transfer-Encoding header", }, { acknowledgments: [ { names: [ "Daniel Abeles", ], organization: "Head of Research, Oxeye", }, { names: [ "Gal Goldstein", ], organization: "Security Researcher, Oxeye", }, ], cve: "CVE-2022-2880", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132868", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request's form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", title: "Vulnerability summary", }, { category: "other", text: "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-2880", }, { category: "external", summary: "RHBZ#2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-2880", url: "https://www.cve.org/CVERecord?id=CVE-2022-2880", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", }, { category: "external", summary: "https://github.com/golang/go/issues/54663", url: "https://github.com/golang/go/issues/54663", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", }, { cve: "CVE-2022-21680", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082705", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression block.def may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21680", }, { category: "external", summary: "RHBZ#2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21680", url: "https://www.cve.org/CVERecord?id=CVE-2022-21680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression block.def may lead Denial of Service", }, { cve: "CVE-2022-21681", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082706", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression inline.reflinkSearch may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21681", }, { category: "external", summary: "RHBZ#2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21681", url: "https://www.cve.org/CVERecord?id=CVE-2022-21681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression inline.reflinkSearch may lead Denial of Service", }, { cve: "CVE-2022-23498", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2023-02-06T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2167266", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana package. When data-source query caching is enabled, Grafana caches all headers, including `grafana_session.` As a result, any user that queries a data source where the caching is enabled can acquire another user’s session.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Use of Cache Containing Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23498", }, { category: "external", summary: "RHBZ#2167266", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167266", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23498", url: "https://www.cve.org/CVERecord?id=CVE-2022-23498", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", }, ], release_date: "2023-02-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "To mitigate the vulnerability, disable the data source query caching for all data sources.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: Use of Cache Containing Sensitive Information", }, { cve: "CVE-2022-24675", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077688", }, ], notes: [ { category: "description", text: "A buffer overflow flaw was found in Golang's library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/pem: fix stack overflow in Decode", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24675", }, { category: "external", summary: "RHBZ#2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24675", url: "https://www.cve.org/CVERecord?id=CVE-2022-24675", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/pem: fix stack overflow in Decode", }, { cve: "CVE-2022-24785", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-04-05T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2072009", }, ], notes: [ { category: "description", text: "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", title: "Vulnerability description", }, { category: "summary", text: "Moment.js: Path traversal in moment.locale", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24785", }, { category: "external", summary: "RHBZ#2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24785", url: "https://www.cve.org/CVERecord?id=CVE-2022-24785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", }, { category: "external", summary: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", url: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", }, ], release_date: "2022-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Sanitize the user-provided locale name before passing it to Moment.js.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Moment.js: Path traversal in moment.locale", }, { cve: "CVE-2022-26148", cwe: { id: "CWE-312", name: "Cleartext Storage of Sensitive Information", }, discovery_date: "2022-03-22T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066563", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right-click to view the source code and use Ctrl-F to search for the password in api_jsonrpc.php to discover the Zabbix account password and URL address.", title: "Vulnerability description", }, { category: "summary", text: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26148", }, { category: "external", summary: "RHBZ#2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26148", url: "https://www.cve.org/CVERecord?id=CVE-2022-26148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", }, ], release_date: "2022-03-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", }, { cve: "CVE-2022-27664", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124669", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: handle server errors after sending GOAWAY", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-27664", }, { category: "external", summary: "RHBZ#2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-27664", url: "https://www.cve.org/CVERecord?id=CVE-2022-27664", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", }, { category: "external", summary: "https://go.dev/issue/54658", url: "https://go.dev/issue/54658", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: handle server errors after sending GOAWAY", }, { cve: "CVE-2022-28131", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107390", }, ], notes: [ { category: "description", text: "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Decoder.Skip", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28131", }, { category: "external", summary: "RHBZ#2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28131", url: "https://www.cve.org/CVERecord?id=CVE-2022-28131", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", }, { category: "external", summary: "https://go.dev/issue/53614", url: "https://go.dev/issue/53614", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Decoder.Skip", }, { cve: "CVE-2022-28327", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077689", }, ], notes: [ { category: "description", text: "An integer overflow flaw was found in Golang's crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/elliptic: panic caused by oversized scalar", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28327", }, { category: "external", summary: "RHBZ#2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28327", url: "https://www.cve.org/CVERecord?id=CVE-2022-28327", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: crypto/elliptic: panic caused by oversized scalar", }, { acknowledgments: [ { names: [ "Joël Gähwiler", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-29526", cwe: { id: "CWE-280", name: "Improper Handling of Insufficient Permissions or Privileges ", }, discovery_date: "2022-05-11T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2084085", }, ], notes: [ { category: "description", text: "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file's group, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: syscall: faccessat checks wrong group", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29526", }, { category: "external", summary: "RHBZ#2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29526", url: "https://www.cve.org/CVERecord?id=CVE-2022-29526", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", url: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", }, ], release_date: "2022-05-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.2, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: syscall: faccessat checks wrong group", }, { cve: "CVE-2022-30629", cwe: { id: "CWE-331", name: "Insufficient Entropy", }, discovery_date: "2022-06-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2092793", }, ], notes: [ { category: "description", text: "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/tls: session tickets lack random ticket_age_add", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30629", }, { category: "external", summary: "RHBZ#2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30629", url: "https://www.cve.org/CVERecord?id=CVE-2022-30629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", url: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", }, ], release_date: "2022-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.1, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: crypto/tls: session tickets lack random ticket_age_add", }, { cve: "CVE-2022-30630", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107371", }, ], notes: [ { category: "description", text: "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: io/fs: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "other", text: "RH ProdSec has set the Impact of this vulnerability to Moderate as there is no known method to execute arbitary code. Successful exploitation of this bug can cause the application under attack to panic, merely causing a Denial of Service at the application level. As the kernel is unaffected by this bug, the user can merely relaunch the application to fix the problem. Also, if somehow the application keeps relaunching, the timer watchdogs in the default RHEL kernel will stop the attack in its tracks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30630", }, { category: "external", summary: "RHBZ#2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30630", url: "https://www.cve.org/CVERecord?id=CVE-2022-30630", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", }, { category: "external", summary: "https://go.dev/issue/53415", url: "https://go.dev/issue/53415", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: io/fs: stack exhaustion in Glob", }, { cve: "CVE-2022-30631", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107342", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: compress/gzip: stack exhaustion in Reader.Read", title: "Vulnerability summary", }, { category: "other", text: "To exploit CVE-2022-30631, an attacker supplies a specially crafted gzip archive to a Go application that uses a vulnerable version of the compress/gzip package without adequate input validation. This can lead to uncontrolled recursion, resulting in stack exhaustion and causing the application to panic, thereby affecting its availability.\n\nAs this is merely a DoS and there is no known way to control the instruction pointer, RH ProdSec has set the impact of this vulnerabilty to \"Moderate\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30631", }, { category: "external", summary: "RHBZ#2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30631", url: "https://www.cve.org/CVERecord?id=CVE-2022-30631", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", }, { category: "external", summary: "https://go.dev/issue/53168", url: "https://go.dev/issue/53168", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: compress/gzip: stack exhaustion in Reader.Read", }, { cve: "CVE-2022-30632", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107386", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: path/filepath: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "other", text: "The exploitation of this flaw will only result in a denial of service of the application via the application crashing which is why this has been rated as moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30632", }, { category: "external", summary: "RHBZ#2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30632", url: "https://www.cve.org/CVERecord?id=CVE-2022-30632", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", }, { category: "external", summary: "https://go.dev/issue/53416", url: "https://go.dev/issue/53416", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: path/filepath: stack exhaustion in Glob", }, { cve: "CVE-2022-30633", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107392", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Unmarshal", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30633", }, { category: "external", summary: "RHBZ#2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30633", url: "https://www.cve.org/CVERecord?id=CVE-2022-30633", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", }, { category: "external", summary: "https://go.dev/issue/53611", url: "https://go.dev/issue/53611", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Unmarshal", }, { cve: "CVE-2022-30635", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107388", }, ], notes: [ { category: "description", text: "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/gob: stack exhaustion in Decoder.Decode", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.The vulnerability has been rated as moderate instead of high because the vulnerability can only result in a minor denial of service.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30635", }, { category: "external", summary: "RHBZ#2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30635", url: "https://www.cve.org/CVERecord?id=CVE-2022-30635", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", }, { category: "external", summary: "https://go.dev/issue/53615", url: "https://go.dev/issue/53615", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/gob: stack exhaustion in Decoder.Decode", }, { cve: "CVE-2022-31097", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104365", }, ], notes: [ { category: "description", text: "A Cross-site scripting (XSS) vulnerability was found in the Unified Alerting feature of Grafana. This stored XSS can elevate privileges from Editor to Admin.", title: "Vulnerability description", }, { category: "summary", text: "grafana: stored XSS vulnerability", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31097", }, { category: "external", summary: "RHBZ#2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31097", url: "https://www.cve.org/CVERecord?id=CVE-2022-31097", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", url: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Disable Unified alerting.\nhttps://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#unified_alerting", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: stored XSS vulnerability", }, { acknowledgments: [ { names: [ "HTTPVoid team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-31107", cwe: { id: "CWE-287", name: "Improper Authentication", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104367", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. This flaw allows a malicious user with the authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under certain conditions.", title: "Vulnerability description", }, { category: "summary", text: "grafana: OAuth account takeover", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31107", }, { category: "external", summary: "RHBZ#2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31107", url: "https://www.cve.org/CVERecord?id=CVE-2022-31107", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", url: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "As a workaround, it is possible to disable any OAuth login or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: OAuth account takeover", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-32148", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107383", }, ], notes: [ { category: "description", text: "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32148", }, { category: "external", summary: "RHBZ#2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32148", url: "https://www.cve.org/CVERecord?id=CVE-2022-32148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", }, { category: "external", summary: "https://go.dev/issue/53423", url: "https://go.dev/issue/53423", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", }, { cve: "CVE-2022-32189", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-08-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2113814", }, ], notes: [ { category: "description", text: "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", title: "Vulnerability summary", }, { category: "other", text: "This flaw stems from a particular and specific method (GoBDecode) which isn't commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32189", }, { category: "external", summary: "RHBZ#2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32189", url: "https://www.cve.org/CVERecord?id=CVE-2022-32189", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", }, { category: "external", summary: "https://go.dev/issue/53871", url: "https://go.dev/issue/53871", }, { category: "external", summary: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", url: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", }, ], release_date: "2022-08-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", }, { cve: "CVE-2022-32190", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124668", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. The JoinPath doesn't remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/url: JoinPath does not strip relative path components in all circumstances", title: "Vulnerability summary", }, { category: "other", text: "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32190", }, { category: "external", summary: "RHBZ#2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32190", url: "https://www.cve.org/CVERecord?id=CVE-2022-32190", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", }, { category: "external", summary: "https://go.dev/issue/54385", url: "https://go.dev/issue/54385", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/url: JoinPath does not strip relative path components in all circumstances", }, { cve: "CVE-2022-35957", cwe: { id: "CWE-288", name: "Authentication Bypass Using an Alternate Path or Channel", }, discovery_date: "2022-09-09T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2125514", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. Auth proxy allows authentication of a user by only providing the username (or email) in an X-WEBAUTH-USER HTTP header. The trust assumption is that a front proxy will take care of authentication and that the Grafana server is only publicly reachable with this front proxy.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Escalation from admin to server admin when auth proxy is used", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-35957", }, { category: "external", summary: "RHBZ#2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-35957", url: "https://www.cve.org/CVERecord?id=CVE-2022-35957", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", url: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", }, ], release_date: "2022-09-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Escalation from admin to server admin when auth proxy is used", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { cve: "CVE-2022-39229", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131149", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application. When a user logs into the system, either the username or email address can be used. However, the login system allows both a username and connected email to be registered, which could allow an attacker to prevent a user which has an associated email address access.", title: "Vulnerability description", }, { category: "summary", text: "grafana: using email as a username can block other users from signing in", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "RHBZ#2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39229", url: "https://www.cve.org/CVERecord?id=CVE-2022-39229", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: using email as a username can block other users from signing in", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { acknowledgments: [ { names: [ "Adam Korczynski", ], organization: "ADA Logics", }, { names: [ "OSS-Fuzz", ], }, ], cve: "CVE-2022-41715", discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132872", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", title: "Vulnerability description", }, { category: "summary", text: "golang: regexp/syntax: limit memory used by parsing regexps", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41715", }, { category: "external", summary: "RHBZ#2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41715", url: "https://www.cve.org/CVERecord?id=CVE-2022-41715", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", }, { category: "external", summary: "https://github.com/golang/go/issues/55949", url: "https://github.com/golang/go/issues/55949", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: regexp/syntax: limit memory used by parsing regexps", }, { cve: "CVE-2022-41912", cwe: { id: "CWE-165", name: "Improper Neutralization of Multiple Internal Special Elements", }, discovery_date: "2022-11-29T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2149181", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in the crewjam/saml go package. A remote unauthenticated attacker could trigger it by sending a SAML request. This would allow an escalation of privileges and then enable compromising system integrity.", title: "Vulnerability description", }, { category: "summary", text: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", title: "Vulnerability summary", }, { category: "other", text: "Whilst the Red Hat Advanced Cluster Management for Kubernetes (RHACM) acm-grafana container include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nThe OCP grafana-container includes the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nWhile Red Hat Ceph Storage 4's grafana-container includes the affected code, this is used for logging and limits access to the rest of the Ceph cluster. Thus the impact has been reduced from critical to important. Red Hat Ceph Storage 3 and 4 do not use crewjam/saml in their version of grafana.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41912", }, { category: "external", summary: "RHBZ#2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41912", url: "https://www.cve.org/CVERecord?id=CVE-2022-41912", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", }, { category: "external", summary: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", url: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", }, ], release_date: "2022-11-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", }, ], }
rhsa-2023_3642
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9.\n\nSecurity Fix(es):\n\n* crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* grafana: stored XSS vulnerability (CVE-2022-31097)\n\n* grafana: OAuth account takeover (CVE-2022-31107)\n\n* ramda: prototype poisoning (CVE-2021-42581)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* marked: regular expression block.def may lead Denial of Service (CVE-2022-21680)\n\n* marked: regular expression inline.reflinkSearch may lead Denial of Service (CVE-2022-21681)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix (CVE-2022-26148)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* grafana: Escalation from admin to server admin when auth proxy is used (CVE-2022-35957)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: using email as a username can block other users from signing in (CVE-2022-39229)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:3642", url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", }, { category: "external", summary: "2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "2168965", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2168965", }, { category: "external", summary: "2174461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174461", }, { category: "external", summary: "2174462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174462", }, { category: "external", summary: "2186142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2186142", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3642.json", }, ], title: "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update", tracking: { current_release_date: "2024-12-17T22:21:21+00:00", generator: { date: "2024-12-17T22:21:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2023:3642", initial_release_date: "2023-06-15T15:59:41+00:00", revision_history: [ { date: "2023-06-15T15:59:41+00:00", number: "1", summary: "Initial version", }, { date: "2023-06-15T15:59:41+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:21:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Ceph Storage 6.1 Tools", product: { name: "Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools", product_identification_helper: { cpe: "cpe:/a:redhat:ceph_storage:6.1::el9", }, }, }, ], category: "product_family", name: "Red Hat Ceph Storage", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_id: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a?arch=amd64&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_id: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_id: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60?arch=amd64&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_id: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661?arch=amd64&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "amd64", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_id: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22?arch=ppc64le&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_id: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_id: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080?arch=ppc64le&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_id: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676?arch=ppc64le&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_id: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9&tag=6-75", }, }, }, { category: "product_version", name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_id: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", product_identification_helper: { purl: "pkg:oci/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97?arch=s390x&repository_url=registry.redhat.io/rhceph/keepalived-rhel9&tag=2.2.4-3", }, }, }, { category: "product_version", name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_id: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9&tag=v2.4.0-5", }, }, }, { category: "product_version", name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_id: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9&tag=6-177", }, }, }, { category: "product_version", name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_id: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", product_identification_helper: { purl: "pkg:oci/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62?arch=s390x&repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9&tag=2.4.17-4", }, }, }, { category: "product_version", name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_id: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", product_identification_helper: { purl: "pkg:oci/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf?arch=s390x&repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9&tag=1.2.1-36", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", }, product_reference: "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", }, product_reference: "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", }, product_reference: "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", }, product_reference: "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", }, product_reference: "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", }, product_reference: "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", }, product_reference: "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, { category: "default_component_of", full_product_name: { name: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x as a component of Red Hat Ceph Storage 6.1 Tools", product_id: "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", }, product_reference: "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", relates_to_product_reference: "9Base-RHCEPH-6.1-Tools", }, ], }, vulnerabilities: [ { cve: "CVE-2021-42581", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-05-10T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083778", }, ], notes: [ { category: "description", text: "A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application.", title: "Vulnerability description", }, { category: "summary", text: "ramda: prototype poisoning", title: "Vulnerability summary", }, { category: "other", text: "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are the application-ui container up to and including RHACM 2.4.4, 2.3.10 and 2.2.13 and grc-ui container up to and including RHACM 2.2.13 versions. However not any RHACM is affected in the kui-web-terminal container as is using already patched and not affected version, therefore we are not impacted in this particular component. In RHACM these components are behind OpenShift OAuth. This restricts access to the vulnerable ramda library to authenticated users only, therefore the impact is reduced to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-42581", }, { category: "external", summary: "RHBZ#2083778", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083778", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-42581", url: "https://www.cve.org/CVERecord?id=CVE-2021-42581", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", }, { category: "external", summary: "https://github.com/ramda/ramda/pull/3192", url: "https://github.com/ramda/ramda/pull/3192", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ramda: prototype poisoning", }, { cve: "CVE-2022-1650", cwe: { id: "CWE-359", name: "Exposure of Private Personal Information to an Unauthorized Actor", }, discovery_date: "2022-05-12T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2085307", }, ], notes: [ { category: "description", text: "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user's credentials and then use the credentials to access the legitimate website.", title: "Vulnerability description", }, { category: "summary", text: "eventsource: Exposure of Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1650", }, { category: "external", summary: "RHBZ#2085307", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2085307", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1650", url: "https://www.cve.org/CVERecord?id=CVE-2022-1650", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", }, { category: "external", summary: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", url: "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", }, ], release_date: "2022-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "eventsource: Exposure of Sensitive Information", }, { cve: "CVE-2022-1705", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107374", }, ], notes: [ { category: "description", text: "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: improper sanitization of Transfer-Encoding header", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1705", }, { category: "external", summary: "RHBZ#2107374", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107374", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1705", url: "https://www.cve.org/CVERecord?id=CVE-2022-1705", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", }, { category: "external", summary: "https://go.dev/issue/53188", url: "https://go.dev/issue/53188", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: improper sanitization of Transfer-Encoding header", }, { acknowledgments: [ { names: [ "Daniel Abeles", ], organization: "Head of Research, Oxeye", }, { names: [ "Gal Goldstein", ], organization: "Security Researcher, Oxeye", }, ], cve: "CVE-2022-2880", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132868", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request's form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", title: "Vulnerability summary", }, { category: "other", text: "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-2880", }, { category: "external", summary: "RHBZ#2132868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132868", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-2880", url: "https://www.cve.org/CVERecord?id=CVE-2022-2880", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", }, { category: "external", summary: "https://github.com/golang/go/issues/54663", url: "https://github.com/golang/go/issues/54663", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", }, { cve: "CVE-2022-21680", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082705", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression block.def may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21680", }, { category: "external", summary: "RHBZ#2082705", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082705", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21680", url: "https://www.cve.org/CVERecord?id=CVE-2022-21680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression block.def may lead Denial of Service", }, { cve: "CVE-2022-21681", cwe: { id: "CWE-186", name: "Overly Restrictive Regular Expression", }, discovery_date: "2022-05-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2082706", }, ], notes: [ { category: "description", text: "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "marked: regular expression inline.reflinkSearch may lead Denial of Service", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21681", }, { category: "external", summary: "RHBZ#2082706", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2082706", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21681", url: "https://www.cve.org/CVERecord?id=CVE-2022-21681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", }, ], release_date: "2022-01-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "marked: regular expression inline.reflinkSearch may lead Denial of Service", }, { cve: "CVE-2022-23498", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2023-02-06T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2167266", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana package. When data-source query caching is enabled, Grafana caches all headers, including `grafana_session.` As a result, any user that queries a data source where the caching is enabled can acquire another user’s session.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Use of Cache Containing Sensitive Information", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23498", }, { category: "external", summary: "RHBZ#2167266", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167266", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23498", url: "https://www.cve.org/CVERecord?id=CVE-2022-23498", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", }, ], release_date: "2023-02-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "To mitigate the vulnerability, disable the data source query caching for all data sources.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: Use of Cache Containing Sensitive Information", }, { cve: "CVE-2022-24675", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077688", }, ], notes: [ { category: "description", text: "A buffer overflow flaw was found in Golang's library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/pem: fix stack overflow in Decode", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24675", }, { category: "external", summary: "RHBZ#2077688", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077688", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24675", url: "https://www.cve.org/CVERecord?id=CVE-2022-24675", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/pem: fix stack overflow in Decode", }, { cve: "CVE-2022-24785", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-04-05T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2072009", }, ], notes: [ { category: "description", text: "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", title: "Vulnerability description", }, { category: "summary", text: "Moment.js: Path traversal in moment.locale", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-24785", }, { category: "external", summary: "RHBZ#2072009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2072009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-24785", url: "https://www.cve.org/CVERecord?id=CVE-2022-24785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", }, { category: "external", summary: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", url: "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", }, ], release_date: "2022-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Sanitize the user-provided locale name before passing it to Moment.js.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Moment.js: Path traversal in moment.locale", }, { cve: "CVE-2022-26148", cwe: { id: "CWE-312", name: "Cleartext Storage of Sensitive Information", }, discovery_date: "2022-03-22T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066563", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right-click to view the source code and use Ctrl-F to search for the password in api_jsonrpc.php to discover the Zabbix account password and URL address.", title: "Vulnerability description", }, { category: "summary", text: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26148", }, { category: "external", summary: "RHBZ#2066563", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066563", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26148", url: "https://www.cve.org/CVERecord?id=CVE-2022-26148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", }, ], release_date: "2022-03-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", }, { cve: "CVE-2022-27664", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124669", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: handle server errors after sending GOAWAY", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-27664", }, { category: "external", summary: "RHBZ#2124669", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124669", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-27664", url: "https://www.cve.org/CVERecord?id=CVE-2022-27664", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", }, { category: "external", summary: "https://go.dev/issue/54658", url: "https://go.dev/issue/54658", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: handle server errors after sending GOAWAY", }, { cve: "CVE-2022-28131", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107390", }, ], notes: [ { category: "description", text: "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Decoder.Skip", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28131", }, { category: "external", summary: "RHBZ#2107390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28131", url: "https://www.cve.org/CVERecord?id=CVE-2022-28131", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", }, { category: "external", summary: "https://go.dev/issue/53614", url: "https://go.dev/issue/53614", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Decoder.Skip", }, { cve: "CVE-2022-28327", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2022-04-21T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077689", }, ], notes: [ { category: "description", text: "An integer overflow flaw was found in Golang's crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/elliptic: panic caused by oversized scalar", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang & go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28327", }, { category: "external", summary: "RHBZ#2077689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28327", url: "https://www.cve.org/CVERecord?id=CVE-2022-28327", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", url: "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", }, ], release_date: "2022-04-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: crypto/elliptic: panic caused by oversized scalar", }, { acknowledgments: [ { names: [ "Joël Gähwiler", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-29526", cwe: { id: "CWE-280", name: "Improper Handling of Insufficient Permissions or Privileges ", }, discovery_date: "2022-05-11T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2084085", }, ], notes: [ { category: "description", text: "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file's group, affecting system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: syscall: faccessat checks wrong group", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29526", }, { category: "external", summary: "RHBZ#2084085", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084085", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29526", url: "https://www.cve.org/CVERecord?id=CVE-2022-29526", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", url: "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", }, ], release_date: "2022-05-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.2, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: syscall: faccessat checks wrong group", }, { cve: "CVE-2022-30629", cwe: { id: "CWE-331", name: "Insufficient Entropy", }, discovery_date: "2022-06-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2092793", }, ], notes: [ { category: "description", text: "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", title: "Vulnerability description", }, { category: "summary", text: "golang: crypto/tls: session tickets lack random ticket_age_add", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30629", }, { category: "external", summary: "RHBZ#2092793", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30629", url: "https://www.cve.org/CVERecord?id=CVE-2022-30629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", url: "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", }, ], release_date: "2022-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.1, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: crypto/tls: session tickets lack random ticket_age_add", }, { cve: "CVE-2022-30630", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107371", }, ], notes: [ { category: "description", text: "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: io/fs: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30630", }, { category: "external", summary: "RHBZ#2107371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30630", url: "https://www.cve.org/CVERecord?id=CVE-2022-30630", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", }, { category: "external", summary: "https://go.dev/issue/53415", url: "https://go.dev/issue/53415", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: io/fs: stack exhaustion in Glob", }, { cve: "CVE-2022-30631", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107342", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: compress/gzip: stack exhaustion in Reader.Read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30631", }, { category: "external", summary: "RHBZ#2107342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107342", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30631", url: "https://www.cve.org/CVERecord?id=CVE-2022-30631", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", }, { category: "external", summary: "https://go.dev/issue/53168", url: "https://go.dev/issue/53168", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: compress/gzip: stack exhaustion in Reader.Read", }, { cve: "CVE-2022-30632", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107386", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: path/filepath: stack exhaustion in Glob", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30632", }, { category: "external", summary: "RHBZ#2107386", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107386", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30632", url: "https://www.cve.org/CVERecord?id=CVE-2022-30632", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", }, { category: "external", summary: "https://go.dev/issue/53416", url: "https://go.dev/issue/53416", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: path/filepath: stack exhaustion in Glob", }, { cve: "CVE-2022-30633", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107392", }, ], notes: [ { category: "description", text: "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/xml: stack exhaustion in Unmarshal", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30633", }, { category: "external", summary: "RHBZ#2107392", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107392", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30633", url: "https://www.cve.org/CVERecord?id=CVE-2022-30633", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", }, { category: "external", summary: "https://go.dev/issue/53611", url: "https://go.dev/issue/53611", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/xml: stack exhaustion in Unmarshal", }, { cve: "CVE-2022-30635", cwe: { id: "CWE-1325", name: "Improperly Controlled Sequential Memory Allocation", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107388", }, ], notes: [ { category: "description", text: "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: encoding/gob: stack exhaustion in Decoder.Decode", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30635", }, { category: "external", summary: "RHBZ#2107388", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107388", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30635", url: "https://www.cve.org/CVERecord?id=CVE-2022-30635", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", }, { category: "external", summary: "https://go.dev/issue/53615", url: "https://go.dev/issue/53615", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: encoding/gob: stack exhaustion in Decoder.Decode", }, { cve: "CVE-2022-31097", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104365", }, ], notes: [ { category: "description", text: "A Cross-site scripting (XSS) vulnerability was found in the Unified Alerting feature of Grafana. This stored XSS can elevate privileges from Editor to Admin.", title: "Vulnerability description", }, { category: "summary", text: "grafana: stored XSS vulnerability", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31097", }, { category: "external", summary: "RHBZ#2104365", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104365", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31097", url: "https://www.cve.org/CVERecord?id=CVE-2022-31097", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", url: "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "Disable Unified alerting.\nhttps://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#unified_alerting", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: stored XSS vulnerability", }, { acknowledgments: [ { names: [ "HTTPVoid team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-31107", cwe: { id: "CWE-287", name: "Improper Authentication", }, discovery_date: "2022-07-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2104367", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. This flaw allows a malicious user with the authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under certain conditions.", title: "Vulnerability description", }, { category: "summary", text: "grafana: OAuth account takeover", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31107", }, { category: "external", summary: "RHBZ#2104367", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2104367", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31107", url: "https://www.cve.org/CVERecord?id=CVE-2022-31107", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", url: "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", }, ], release_date: "2022-07-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "workaround", details: "As a workaround, it is possible to disable any OAuth login or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "grafana: OAuth account takeover", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-32148", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-07-14T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2107383", }, ], notes: [ { category: "description", text: "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32148", }, { category: "external", summary: "RHBZ#2107383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2107383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32148", url: "https://www.cve.org/CVERecord?id=CVE-2022-32148", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", }, { category: "external", summary: "https://go.dev/issue/53423", url: "https://go.dev/issue/53423", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, ], release_date: "2022-07-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", }, { cve: "CVE-2022-32189", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2022-08-02T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2113814", }, ], notes: [ { category: "description", text: "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", title: "Vulnerability description", }, { category: "summary", text: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", title: "Vulnerability summary", }, { category: "other", text: "This flaw stems from a particular and specific method (GoBDecode) which isn't commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32189", }, { category: "external", summary: "RHBZ#2113814", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2113814", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32189", url: "https://www.cve.org/CVERecord?id=CVE-2022-32189", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", }, { category: "external", summary: "https://go.dev/issue/53871", url: "https://go.dev/issue/53871", }, { category: "external", summary: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", url: "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", }, ], release_date: "2022-08-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", }, { cve: "CVE-2022-32190", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2022-09-06T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2124668", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package. The JoinPath doesn't remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/url: JoinPath does not strip relative path components in all circumstances", title: "Vulnerability summary", }, { category: "other", text: "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-32190", }, { category: "external", summary: "RHBZ#2124668", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-32190", url: "https://www.cve.org/CVERecord?id=CVE-2022-32190", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", }, { category: "external", summary: "https://go.dev/issue/54385", url: "https://go.dev/issue/54385", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", url: "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", }, ], release_date: "2022-09-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/url: JoinPath does not strip relative path components in all circumstances", }, { cve: "CVE-2022-35957", cwe: { id: "CWE-288", name: "Authentication Bypass Using an Alternate Path or Channel", }, discovery_date: "2022-09-09T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2125514", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. Auth proxy allows authentication of a user by only providing the username (or email) in an X-WEBAUTH-USER HTTP header. The trust assumption is that a front proxy will take care of authentication and that the Grafana server is only publicly reachable with this front proxy.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Escalation from admin to server admin when auth proxy is used", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-35957", }, { category: "external", summary: "RHBZ#2125514", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2125514", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-35957", url: "https://www.cve.org/CVERecord?id=CVE-2022-35957", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", url: "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", }, ], release_date: "2022-09-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Escalation from admin to server admin when auth proxy is used", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { cve: "CVE-2022-39229", discovery_date: "2022-09-30T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131149", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application. When a user logs into the system, either the username or email address can be used. However, the login system allows both a username and connected email to be registered, which could allow an attacker to prevent a user which has an associated email address access.", title: "Vulnerability description", }, { category: "summary", text: "grafana: using email as a username can block other users from signing in", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39229", }, { category: "external", summary: "RHBZ#2131149", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131149", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39229", url: "https://www.cve.org/CVERecord?id=CVE-2022-39229", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: using email as a username can block other users from signing in", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { acknowledgments: [ { names: [ "Adam Korczynski", ], organization: "ADA Logics", }, { names: [ "OSS-Fuzz", ], }, ], cve: "CVE-2022-41715", discovery_date: "2022-10-07T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2132872", }, ], notes: [ { category: "description", text: "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", title: "Vulnerability description", }, { category: "summary", text: "golang: regexp/syntax: limit memory used by parsing regexps", title: "Vulnerability summary", }, { category: "other", text: "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41715", }, { category: "external", summary: "RHBZ#2132872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2132872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41715", url: "https://www.cve.org/CVERecord?id=CVE-2022-41715", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", }, { category: "external", summary: "https://github.com/golang/go/issues/55949", url: "https://github.com/golang/go/issues/55949", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", url: "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", }, ], release_date: "2022-10-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: regexp/syntax: limit memory used by parsing regexps", }, { cve: "CVE-2022-41912", cwe: { id: "CWE-165", name: "Improper Neutralization of Multiple Internal Special Elements", }, discovery_date: "2022-11-29T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2149181", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in the crewjam/saml go package. A remote unauthenticated attacker could trigger it by sending a SAML request. This would allow an escalation of privileges and then enable compromising system integrity.", title: "Vulnerability description", }, { category: "summary", text: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", title: "Vulnerability summary", }, { category: "other", text: "Whilst the Red Hat Advanced Cluster Management for Kubernetes (RHACM) acm-grafana container include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nThe OCP grafana-container includes the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nWhile Red Hat Ceph Storage 4's grafana-container includes the affected code, this is used for logging and limits access to the rest of the Ceph cluster. Thus the impact has been reduced from critical to important. Red Hat Ceph Storage 3 and 4 do not use crewjam/saml in their version of grafana.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], known_not_affected: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41912", }, { category: "external", summary: "RHBZ#2149181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2149181", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41912", url: "https://www.cve.org/CVERecord?id=CVE-2022-41912", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", }, { category: "external", summary: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", url: "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", }, ], release_date: "2022-11-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-06-15T15:59:41+00:00", details: "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", product_ids: [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:3642", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", }, ], }
rhsa-2023:6420
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. \n\nSecurity Fix(es):\n\n* grafana: persistent xss in grafana core plugins (CVE-2022-23552)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:6420", url: "https://access.redhat.com/errata/RHSA-2023:6420", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index", }, { category: "external", summary: "2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "2188193", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188193", }, { category: "external", summary: "2193018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2193018", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6420.json", }, ], title: "Red Hat Security Advisory: grafana security and enhancement update", tracking: { current_release_date: "2025-03-20T13:35:54+00:00", generator: { date: "2025-03-20T13:35:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2023:6420", initial_release_date: "2023-11-07T08:59:06+00:00", revision_history: [ { date: "2023-11-07T08:59:06+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-07T08:59:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T13:35:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.src", product: { name: "grafana-0:9.2.10-7.el9_3.src", product_id: "grafana-0:9.2.10-7.el9_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=aarch64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=ppc64le", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=x86_64", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "grafana-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-0:9.2.10-7.el9_3.s390x", product_id: "grafana-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debugsource@9.2.10-7.el9_3?arch=s390x", }, }, }, { category: "product_version", name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_id: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/grafana-debuginfo@9.2.10-7.el9_3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", }, product_reference: "grafana-0:9.2.10-7.el9_3.src", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.aarch64", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.s390x", relates_to_product_reference: "AppStream-9.3.0.GA", }, { category: "default_component_of", full_product_name: { name: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", }, product_reference: "grafana-debugsource-0:9.2.10-7.el9_3.x86_64", relates_to_product_reference: "AppStream-9.3.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Grafana Security Team", ], }, ], cve: "CVE-2022-23552", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2023-01-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2158420", }, ], notes: [ { category: "description", text: "A flaw was found in The GeoMap and Canvas plugins of Grafana. The GeoMap and Canvas plugins are core plugins in Grafana, which means that all Grafana instances have GeoMap and Canvas installed. These two plugins are vulnerable to Cross-site scripting, where an attacker with an Editor role can add an SVG file containing malicious JavaScript code. The Javascript is executed when a user with an admin role later edits the GeoMap/Canvas panel.", title: "Vulnerability description", }, { category: "summary", text: "grafana: persistent xss in grafana core plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23552", }, { category: "external", summary: "RHBZ#2158420", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2158420", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23552", url: "https://www.cve.org/CVERecord?id=CVE-2022-23552", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23552", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-27T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: persistent xss in grafana core plugins", }, { cve: "CVE-2022-31123", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131147", }, ], notes: [ { category: "description", text: "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", title: "Vulnerability description", }, { category: "summary", text: "grafana: plugin signature bypass", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31123", }, { category: "external", summary: "RHBZ#2131147", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131147", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31123", url: "https://www.cve.org/CVERecord?id=CVE-2022-31123", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", }, { category: "external", summary: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", url: "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: plugin signature bypass", }, { cve: "CVE-2022-31130", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131146", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana's use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user's authentication token, which could be used by an attacker.", title: "Vulnerability description", }, { category: "summary", text: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31130", }, { category: "external", summary: "RHBZ#2131146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31130", url: "https://www.cve.org/CVERecord?id=CVE-2022-31130", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", }, { cve: "CVE-2022-39201", discovery_date: "2022-09-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2131148", }, ], notes: [ { category: "description", text: "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39201", }, { category: "external", summary: "RHBZ#2131148", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2131148", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39201", url: "https://www.cve.org/CVERecord?id=CVE-2022-39201", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", }, ], release_date: "2022-10-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", }, { acknowledgments: [ { names: [ "Grafana Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39306", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138014", }, ], notes: [ { category: "description", text: "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "grafana: email addresses and usernames cannot be trusted", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39306", }, { category: "external", summary: "RHBZ#2138014", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138014", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39306", url: "https://www.cve.org/CVERecord?id=CVE-2022-39306", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: email addresses and usernames cannot be trusted", }, { acknowledgments: [ { names: [ "Grafana Team", ], }, ], cve: "CVE-2022-39307", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-10-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2138015", }, ], notes: [ { category: "description", text: "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", title: "Vulnerability description", }, { category: "summary", text: "grafana: User enumeration via forget password", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "RHBZ#2138015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2138015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39307", url: "https://www.cve.org/CVERecord?id=CVE-2022-39307", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { category: "external", summary: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, ], release_date: "2022-11-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: User enumeration via forget password", }, { acknowledgments: [ { names: [ "Grafana Security Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2022-39324", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, discovery_date: "2022-11-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2148252", }, ], notes: [ { category: "description", text: "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", title: "Vulnerability description", }, { category: "summary", text: "grafana: Spoofing of the originalUrl parameter of snapshots", title: "Vulnerability summary", }, { category: "other", text: "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-39324", }, { category: "external", summary: "RHBZ#2148252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2148252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-39324", url: "https://www.cve.org/CVERecord?id=CVE-2022-39324", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", }, { category: "external", summary: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", url: "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", }, ], release_date: "2023-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "grafana: Spoofing of the originalUrl parameter of snapshots", }, { cve: "CVE-2022-41717", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2023-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2161274", }, ], notes: [ { category: "description", text: "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", title: "Vulnerability summary", }, { category: "other", text: "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-41717", }, { category: "external", summary: "RHBZ#2161274", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2161274", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-41717", url: "https://www.cve.org/CVERecord?id=CVE-2022-41717", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", }, { category: "external", summary: "https://go.dev/cl/455635", url: "https://go.dev/cl/455635", }, { category: "external", summary: "https://go.dev/cl/455717", url: "https://go.dev/cl/455717", }, { category: "external", summary: "https://go.dev/issue/56350", url: "https://go.dev/issue/56350", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", url: "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2022-1144", url: "https://pkg.go.dev/vuln/GO-2022-1144", }, ], release_date: "2022-11-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", }, { cve: "CVE-2023-24534", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-04-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2184483", }, ], notes: [ { category: "description", text: "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, net/textproto: denial of service from excessive memory allocation", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-24534", }, { category: "external", summary: "RHBZ#2184483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2184483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-24534", url: "https://www.cve.org/CVERecord?id=CVE-2023-24534", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", }, { category: "external", summary: "https://go.dev/issue/58975", url: "https://go.dev/issue/58975", }, { category: "external", summary: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", url: "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", }, ], release_date: "2023-04-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-07T08:59:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:6420", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.src", "AppStream-9.3.0.GA:grafana-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debuginfo-0:9.2.10-7.el9_3.x86_64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.aarch64", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.ppc64le", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.s390x", "AppStream-9.3.0.GA:grafana-debugsource-0:9.2.10-7.el9_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "golang: net/http, net/textproto: denial of service from excessive memory allocation", }, ], }
gsd-2022-39307
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-39307", description: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", id: "GSD-2022-39307", references: [ "https://www.suse.com/security/cve/CVE-2022-39307.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-39307", ], details: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", id: "GSD-2022-39307", modified: "2023-12-13T01:19:20.983227Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-39307", STATE: "PUBLIC", TITLE: "Grafana subject to Exposure of Sensitive Information resulting in User enumeration via forget password", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "grafana", version: { version_data: [ { version_value: ">= v9.0.0-beta1, < 9.2.4", }, { version_value: "< 8.5.15", }, ], }, }, ], }, vendor_name: "grafana", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", }, ], }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", refsource: "CONFIRM", url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { name: "https://security.netapp.com/advisory/ntap-20221215-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, ], }, source: { advisory: "GHSA-3p62-42x7-gxg5", discovery: "UNKNOWN", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.2.4", versionStartIncluding: "9.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.5.15", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-39307", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-209", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { name: "https://security.netapp.com/advisory/ntap-20221215-0004/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, ], }, }, impact: { baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, }, }, lastModifiedDate: "2023-07-14T19:10Z", publishedDate: "2022-11-09T23:15Z", }, }, }
wid-sec-w-2023-0334
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um Benutzerrechte zu erlangen, seine Privilegien zu erweitern und um Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0334 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0334.json", }, { category: "self", summary: "WID-SEC-2023-0334 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0334", }, { category: "external", summary: "Grafana Security release vom 2022-11-08", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0362-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0353-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0352-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3642 vom 2023-06-15", url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "external", summary: "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", url: "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:6420 vom 2023-11-07", url: "https://access.redhat.com/errata/RHSA-2023:6420", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0191-1 vom 2024-01-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html", }, ], source_lang: "en-US", title: "Grafana: Mehrere Schwachstellen", tracking: { current_release_date: "2024-01-23T23:00:00.000+00:00", generator: { date: "2024-08-15T17:43:22.465+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0334", initial_release_date: "2022-11-08T23:00:00.000+00:00", revision_history: [ { date: "2022-11-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-02-12T23:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-15T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-10-03T22:00:00.000+00:00", number: "4", summary: "Neue Updates von HITACHI aufgenommen", }, { date: "2023-11-07T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-01-23T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Hitachi Ops Center < Analyzer 10.9.3-00", product: { name: "Hitachi Ops Center < Analyzer 10.9.3-00", product_id: "T030196", product_identification_helper: { cpe: "cpe:/a:hitachi:ops_center:analyzer_10.9.3-00", }, }, }, { category: "product_name", name: "Hitachi Ops Center < Viewpoint 10.9.3-00", product: { name: "Hitachi Ops Center < Viewpoint 10.9.3-00", product_id: "T030197", product_identification_helper: { cpe: "cpe:/a:hitachi:ops_center:viewpoint_10.9.3-00", }, }, }, ], category: "product_name", name: "Ops Center", }, ], category: "vendor", name: "Hitachi", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source Grafana < 9.2.4", product: { name: "Open Source Grafana < 9.2.4", product_id: "T025262", product_identification_helper: { cpe: "cpe:/a:grafana:grafana:9.2.4", }, }, }, { category: "product_name", name: "Open Source Grafana < 8.5.15", product: { name: "Open Source Grafana < 8.5.15", product_id: "T025263", product_identification_helper: { cpe: "cpe:/a:grafana:grafana:8.5.15", }, }, }, ], category: "product_name", name: "Grafana", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2022-39306", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana im Zusammenhang mit Einladungs-Mails. Administratoren können Einladungen an Empfänger versenden, die noch kein Nutzerkonto in Grafana besitzen, damit diese sich ein Nutzerkonto anlegen können. Bei der Nutzung des Einladungs-Links wird jedoch nicht geprüft, ob die neu registrierte E-Mail Adresse die Adresse aus der Einladung ist. Somit kann ein Angreifer, der über den Einladungs-Link verfügt, ein Nutzerkonto für beliebige E-Mail Adressen registrieren und somit Nutzerrechte erlangen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana im Zusammenhang mit der \"Passwort Vergessen\" Seite. Diese löst einen API-Aufruf an \"/api/user/password/sent-reset-email\" aus. Die JSON-Antwort dieses Endpunkts gibt bei nicht bekannten E-Mail Adressen einen \"user not found\" Fehler aus. Ein Angreifer kann dadurch offenlegen, ob ein bestimmter Nutzer im System existiert.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39307", }, { cve: "CVE-2022-39328", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana aufgrund einer \"Race Condition\" bei der \"HTTP Context\"-Erzeugung. Unter hoher Last kann es dadurch vorkommen, dass eine HTTP Anfrage an die Middleware einer anderen Anfrage geknüpft wird. Beispielsweise kann kann eine unprivilegierte Anfrage mit einer privilegierten Anfrage verknüpft werden. Ein Angreifer kann dadurch seine Privilegien erweitern.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39328", }, ], }
WID-SEC-W-2023-0334
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um Benutzerrechte zu erlangen, seine Privilegien zu erweitern und um Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0334 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0334.json", }, { category: "self", summary: "WID-SEC-2023-0334 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0334", }, { category: "external", summary: "Grafana Security release vom 2022-11-08", url: "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0362-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0353-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0352-1 vom 2023-02-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3642 vom 2023-06-15", url: "https://access.redhat.com/errata/RHSA-2023:3642", }, { category: "external", summary: "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", url: "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:6420 vom 2023-11-07", url: "https://access.redhat.com/errata/RHSA-2023:6420", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0191-1 vom 2024-01-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html", }, ], source_lang: "en-US", title: "Grafana: Mehrere Schwachstellen", tracking: { current_release_date: "2024-01-23T23:00:00.000+00:00", generator: { date: "2024-08-15T17:43:22.465+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0334", initial_release_date: "2022-11-08T23:00:00.000+00:00", revision_history: [ { date: "2022-11-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-02-12T23:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-15T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-10-03T22:00:00.000+00:00", number: "4", summary: "Neue Updates von HITACHI aufgenommen", }, { date: "2023-11-07T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-01-23T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Hitachi Ops Center < Analyzer 10.9.3-00", product: { name: "Hitachi Ops Center < Analyzer 10.9.3-00", product_id: "T030196", product_identification_helper: { cpe: "cpe:/a:hitachi:ops_center:analyzer_10.9.3-00", }, }, }, { category: "product_name", name: "Hitachi Ops Center < Viewpoint 10.9.3-00", product: { name: "Hitachi Ops Center < Viewpoint 10.9.3-00", product_id: "T030197", product_identification_helper: { cpe: "cpe:/a:hitachi:ops_center:viewpoint_10.9.3-00", }, }, }, ], category: "product_name", name: "Ops Center", }, ], category: "vendor", name: "Hitachi", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source Grafana < 9.2.4", product: { name: "Open Source Grafana < 9.2.4", product_id: "T025262", product_identification_helper: { cpe: "cpe:/a:grafana:grafana:9.2.4", }, }, }, { category: "product_name", name: "Open Source Grafana < 8.5.15", product: { name: "Open Source Grafana < 8.5.15", product_id: "T025263", product_identification_helper: { cpe: "cpe:/a:grafana:grafana:8.5.15", }, }, }, ], category: "product_name", name: "Grafana", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2022-39306", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana im Zusammenhang mit Einladungs-Mails. Administratoren können Einladungen an Empfänger versenden, die noch kein Nutzerkonto in Grafana besitzen, damit diese sich ein Nutzerkonto anlegen können. Bei der Nutzung des Einladungs-Links wird jedoch nicht geprüft, ob die neu registrierte E-Mail Adresse die Adresse aus der Einladung ist. Somit kann ein Angreifer, der über den Einladungs-Link verfügt, ein Nutzerkonto für beliebige E-Mail Adressen registrieren und somit Nutzerrechte erlangen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39306", }, { cve: "CVE-2022-39307", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana im Zusammenhang mit der \"Passwort Vergessen\" Seite. Diese löst einen API-Aufruf an \"/api/user/password/sent-reset-email\" aus. Die JSON-Antwort dieses Endpunkts gibt bei nicht bekannten E-Mail Adressen einen \"user not found\" Fehler aus. Ein Angreifer kann dadurch offenlegen, ob ein bestimmter Nutzer im System existiert.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39307", }, { cve: "CVE-2022-39328", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Grafana aufgrund einer \"Race Condition\" bei der \"HTTP Context\"-Erzeugung. Unter hoher Last kann es dadurch vorkommen, dass eine HTTP Anfrage an die Middleware einer anderen Anfrage geknüpft wird. Beispielsweise kann kann eine unprivilegierte Anfrage mit einer privilegierten Anfrage verknüpft werden. Ein Angreifer kann dadurch seine Privilegien erweitern.", }, ], product_status: { known_affected: [ "T002207", "67646", "T030196", "T030197", ], }, release_date: "2022-11-08T23:00:00.000+00:00", title: "CVE-2022-39328", }, ], }
fkie_cve-2022-39307
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", matchCriteriaId: "E14BE3CF-706D-46EF-BC46-176252F61AA4", versionEndExcluding: "8.5.15", vulnerable: true, }, { criteria: "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", matchCriteriaId: "3E1FE6F4-C2C8-432B-91AF-01A4D4036956", versionEndExcluding: "9.2.4", versionStartIncluding: "9.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", }, { lang: "es", value: "Grafana es una plataforma de código abierto para monitorización y observabilidad. Cuando se utiliza la opción de olvidar contraseña en la página de inicio de sesión, se realiza una solicitud POST a la URL `/api/user/password/sent-reset-email`. Cuando el nombre de usuario o el correo electrónico no existe, una respuesta JSON contiene un mensaje \"usuario no encontrado\". Esto filtra información a usuarios no autenticados e introduce un riesgo de seguridad. Este problema se solucionó en 9.2.4 y se actualizó a 8.5.15. No se conocen workarounds.", }, ], id: "CVE-2022-39307", lastModified: "2024-11-21T07:18:00.080", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.5, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T23:15:12.617", references: [ { source: "security-advisories@github.com", tags: [ "Vendor Advisory", ], url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221215-0004/", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-209", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-3p62-42x7-gxg5
Vulnerability from github
7.3 (High) - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Today we are releasing Grafana 9.2.4. Alongside other bug fixes, this patch release includes moderate security fixes for CVE-2022-39307.
We are also releasing security patches for Grafana 8.5.15 to fix these issues.
Release 9.2.4, latest patch, also containing security fix:
Release 8.5.15, only containing security fix:
Appropriate patches have been applied to Grafana Cloud and as always, we closely coordinated with all cloud providers licensed to offer Grafana Pro. They have received early notification under embargo and confirmed that their offerings are secure at the time of this announcement. This is applicable to Amazon Managed Grafana and Azure Managed Grafana as a service offering.
Username enumeration
Summary
When using the forget password on the login page, a POST request is made to the /api/user/password/sent-reset-email
URL. When the username or email does not exist, a JSON response contains a “user not found” message.
The CVSS score for this vulnerability is 5.3 Moderate
Impact
The impacted endpoint leaks information to unauthenticated users and introduces a security risk.
Impacted versions
All installations for Grafana versions Grafana <=9.x, <8.x
Solutions and mitigations
To fully address CVE-2022-39307, please upgrade your Grafana instances. Appropriate patches have been applied to Grafana Cloud.
Reporting security issues
If you think you have found a security vulnerability, please send a report to security@grafana.com. This address can be used for all of Grafana Labs' open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from keyserver.ubuntu.com.
Security announcements
We maintain a security category on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.
You can also subscribe to our RSS feed.
{ affected: [ { package: { ecosystem: "Go", name: "github.com/grafana/grafana", }, ranges: [ { events: [ { introduced: "9.0.0", }, { fixed: "9.2.4", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "github.com/grafana/grafana", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "8.5.15", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2022-39307", ], database_specific: { cwe_ids: [ "CWE-200", "CWE-209", ], github_reviewed: true, github_reviewed_at: "2024-05-14T22:29:31Z", nvd_published_at: "2022-11-09T23:15:12Z", severity: "HIGH", }, details: "Today we are releasing Grafana 9.2.4. Alongside other bug fixes, this patch release includes moderate security fixes for CVE-2022-39307.\n\nWe are also releasing security patches for Grafana 8.5.15 to fix these issues.\n\nRelease 9.2.4, latest patch, also containing security fix:\n\n- [Download Grafana 9.2.4](https://grafana.com/grafana/download/9.2.4)\n\nRelease 8.5.15, only containing security fix:\n\n- [Download Grafana 8.5.15](https://grafana.com/grafana/download/8.5.15)\n\nAppropriate patches have been applied to [Grafana Cloud](https://grafana.com/cloud) and as always, we closely coordinated with all cloud providers licensed to offer Grafana Pro. They have received early notification under embargo and confirmed that their offerings are secure at the time of this announcement. This is applicable to Amazon Managed Grafana and Azure Managed Grafana as a service offering.\n\n## Username enumeration\n\n### Summary \n\nWhen using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message.\n\nThe CVSS score for this vulnerability is [5.3 Moderate](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&version=3.1)\n\n### Impact\n\nThe impacted endpoint leaks information to unauthenticated users and introduces a security risk.\n\n### Impacted versions\n\nAll installations for Grafana versions Grafana <=9.x, <8.x\n\n### Solutions and mitigations\n\nTo fully address CVE-2022-39307, please upgrade your Grafana instances. \nAppropriate patches have been applied to [Grafana Cloud](https://grafana.com/cloud). \n\n## Reporting security issues\n\nIf you think you have found a security vulnerability, please send a report to security@grafana.com. This address can be used for all of Grafana Labs' open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is\n\nF988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA\n\nThe key is available from keyserver.ubuntu.com.\n\n## Security announcements\n\nWe maintain a [security category](https://community.grafana.com/c/support/security-announcements) on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.\n\nYou can also subscribe to our [RSS feed](https://grafana.com/tags/security/index.xml).", id: "GHSA-3p62-42x7-gxg5", modified: "2024-11-18T16:26:41Z", published: "2024-05-14T22:29:31Z", references: [ { type: "WEB", url: "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5", }, { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", }, { type: "PACKAGE", url: "https://github.com/grafana/grafana", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20221215-0004", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", type: "CVSS_V3", }, { score: "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N", type: "CVSS_V4", }, ], summary: "Grafana User enumeration via forget password", }
opensuse-su-2024:12531-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "grafana-8.5.15-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the grafana-8.5.15-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12531", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12531-1.json", }, { category: "self", summary: "SUSE CVE CVE-2022-3930 page", url: "https://www.suse.com/security/cve/CVE-2022-3930/", }, { category: "self", summary: "SUSE CVE CVE-2022-39307 page", url: "https://www.suse.com/security/cve/CVE-2022-39307/", }, ], title: "grafana-8.5.15-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12531-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "grafana-8.5.15-1.1.aarch64", product: { name: "grafana-8.5.15-1.1.aarch64", product_id: "grafana-8.5.15-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.1.ppc64le", product: { name: "grafana-8.5.15-1.1.ppc64le", product_id: "grafana-8.5.15-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.1.s390x", product: { name: "grafana-8.5.15-1.1.s390x", product_id: "grafana-8.5.15-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "grafana-8.5.15-1.1.x86_64", product: { name: "grafana-8.5.15-1.1.x86_64", product_id: "grafana-8.5.15-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", }, product_reference: "grafana-8.5.15-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", }, product_reference: "grafana-8.5.15-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", }, product_reference: "grafana-8.5.15-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "grafana-8.5.15-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", }, product_reference: "grafana-8.5.15-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2022-3930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3930", }, ], notes: [ { category: "general", text: "The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3930", url: "https://www.suse.com/security/cve/CVE-2022-3930", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3930", }, { cve: "CVE-2022-39307", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39307", }, ], notes: [ { category: "general", text: "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39307", url: "https://www.suse.com/security/cve/CVE-2022-39307", }, { category: "external", summary: "SUSE Bug 1205227 for CVE-2022-39307", url: "https://bugzilla.suse.com/1205227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:grafana-8.5.15-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.5.15-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.5.15-1.1.s390x", "openSUSE Tumbleweed:grafana-8.5.15-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-39307", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.