Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-27304 (GCVE-0-2024-27304)
Vulnerability from cvelistv5 – Published: 2024-03-06 19:07 – Updated: 2024-12-12 20:52| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:jackc:pgx:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "pgx",
"vendor": "jackc",
"versions": [
{
"lessThan": "4.18.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:jackc:pgx:5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "pgx",
"vendor": "jackc",
"versions": [
{
"lessThan": "5.5.4",
"status": "affected",
"version": "5.0.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-27304",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-06T20:31:57.168692Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-25T16:31:36.133Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:27:59.959Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
},
{
"name": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"name": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"name": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"name": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"name": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "pgx",
"vendor": "jackc",
"versions": [
{
"status": "affected",
"version": "\u003c 4.18.2"
},
{
"status": "affected",
"version": "\u003e= 5.0.0, \u003c 5.5.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190: Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-12T20:52:24.821Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
},
{
"name": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"name": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"name": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"name": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"name": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"name": "https://www.youtube.com/watch?v=Tfg1B8u1yvE",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.youtube.com/watch?v=Tfg1B8u1yvE"
}
],
"source": {
"advisory": "GHSA-mrww-27vc-gghv",
"discovery": "UNKNOWN"
},
"title": "pgx SQL Injection via Protocol Message Size Overflow"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-27304",
"datePublished": "2024-03-06T19:07:08.491Z",
"dateReserved": "2024-02-22T18:08:38.875Z",
"dateUpdated": "2024-12-12T20:52:24.821Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.\"}, {\"lang\": \"es\", \"value\": \"pgx es un controlador PostgreSQL y un conjunto de herramientas para Go. La inyecci\\u00f3n de SQL puede ocurrir si un atacante puede hacer que una sola consulta o mensaje de enlace supere los 4 GB de tama\\u00f1o. Un desbordamiento de enteros en el tama\\u00f1o del mensaje calculado puede provocar que un mensaje grande se env\\u00ede como varios mensajes bajo el control del atacante. El problema se resuelve en v4.18.2 y v5.5.4. Como soluci\\u00f3n alternativa, rechace la entrada del usuario lo suficientemente grande como para provocar que una sola consulta o mensaje vinculado supere los 4 GB de tama\\u00f1o.\"}]",
"id": "CVE-2024-27304",
"lastModified": "2024-12-12T21:15:07.677",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
"published": "2024-03-06T19:15:08.767",
"references": "[{\"url\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://www.youtube.com/watch?v=Tfg1B8u1yvE\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}, {\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-27304\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-03-06T19:15:08.767\",\"lastModified\":\"2025-12-04T17:33:44.540\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.\"},{\"lang\":\"es\",\"value\":\"pgx es un controlador PostgreSQL y un conjunto de herramientas para Go. La inyecci\u00f3n de SQL puede ocurrir si un atacante puede hacer que una sola consulta o mensaje de enlace supere los 4 GB de tama\u00f1o. Un desbordamiento de enteros en el tama\u00f1o del mensaje calculado puede provocar que un mensaje grande se env\u00ede como varios mensajes bajo el control del atacante. El problema se resuelve en v4.18.2 y v5.5.4. Como soluci\u00f3n alternativa, rechace la entrada del usuario lo suficientemente grande como para provocar que una sola consulta o mensaje vinculado supere los 4 GB de tama\u00f1o.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"},{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgproto3_project:pgproto3:*:*:*:*:*:go:*:*\",\"versionEndExcluding\":\"2.3.3\",\"matchCriteriaId\":\"595DDCC9-AC88-4702-8771-EE3C382AAB9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgx_project:pgx:*:*:*:*:*:go:*:*\",\"versionEndExcluding\":\"4.18.2\",\"matchCriteriaId\":\"A544EDA8-8EF2-407D-8534-2AF89534F7AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgx_project:pgx:*:*:*:*:*:go:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.5.4\",\"matchCriteriaId\":\"FC1EF367-3F2F-4280-BEBB-CE1875BFAC3B\"}]}]}],\"references\":[{\"url\":\"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.youtube.com/watch?v=Tfg1B8u1yvE\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"name\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"name\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"name\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"name\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"name\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"name\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:27:59.959Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27304\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-06T20:31:57.168692Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:jackc:pgx:*:*:*:*:*:*:*:*\"], \"vendor\": \"jackc\", \"product\": \"pgx\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.18.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:jackc:pgx:5.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"jackc\", \"product\": \"pgx\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0.0\", \"lessThan\": \"5.5.4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-25T16:31:26.402Z\"}}], \"cna\": {\"title\": \"pgx SQL Injection via Protocol Message Size Overflow\", \"source\": {\"advisory\": \"GHSA-mrww-27vc-gghv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"jackc\", \"product\": \"pgx\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 4.18.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 5.0.0, \u003c 5.5.4\"}]}], \"references\": [{\"url\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"name\": \"https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"name\": \"https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"name\": \"https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"name\": \"https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"name\": \"https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"name\": \"https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.youtube.com/watch?v=Tfg1B8u1yvE\", \"name\": \"https://www.youtube.com/watch?v=Tfg1B8u1yvE\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190: Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-12-12T20:52:24.821Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-27304\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-12T20:52:24.821Z\", \"dateReserved\": \"2024-02-22T18:08:38.875Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-03-06T19:07:08.491Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2024:1321
Vulnerability from csaf_redhat - Published: 2024-03-13 20:55 - Updated: 2025-12-06 00:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security. The\nupdated image includes bug and security fixes.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release of RHACS 4.3.5 provides the following bug fix:\n\n* Fixed an issue where an upgrade to RHACS 4.3 from a previous version caused the Central component to enter a crash loop.\n\nIt provides the following security fixes:\n\n* pgx: SQL Injection via Protocol Message Size Overflow (CVE-2024-27304)\n* pgx: SQL Injection via Line Comment Creation (CVE-2024-27289)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1321",
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2268269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268269"
},
{
"category": "external",
"summary": "2268465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268465"
},
{
"category": "external",
"summary": "ROX-23133",
"url": "https://issues.redhat.com/browse/ROX-23133"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1321.json"
}
],
"title": "Red Hat Security Advisory: ACS 4.3 enhancement and security update",
"tracking": {
"current_release_date": "2025-12-06T00:29:30+00:00",
"generator": {
"date": "2025-12-06T00:29:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:1321",
"initial_release_date": "2024-03-13T20:55:36+00:00",
"revision_history": [
{
"date": "2024-03-13T20:55:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-13T20:55:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-06T00:29:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 4.3 for RHEL 8",
"product": {
"name": "RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27289",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2024-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pgx. SQL injection can occur when all of the following conditions are met in versions before 4.18.2 of pgx.\u00a0\r\n- The non-default simple protocol is used\r\n- A placeholder for a numeric value must be immediately preceded by a minus\r\n- There must be a second placeholder for a string value after the first placeholder\r\n- Both must be on the same line\r\n- Both parameter values must be user-controlled",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pgx: SQL Injection via Line Comment Creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27289"
},
{
"category": "external",
"summary": "RHBZ#2268465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27289"
},
{
"category": "external",
"summary": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df",
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"category": "external",
"summary": "https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p",
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2605",
"url": "https://pkg.go.dev/vuln/GO-2024-2605"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-13T20:55:36+00:00",
"details": "If you are using an earlier version of RHACS 4.3, you are advised to upgrade to patch release 4.3.5.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
},
{
"category": "workaround",
"details": "A possible mitigation is to not use the simple protocol or do not place a minus directly before a placeholder.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pgx: SQL Injection via Line Comment Creation"
},
{
"cve": "CVE-2024-27304",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268269"
}
],
"notes": [
{
"category": "description",
"text": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pgx: SQL Injection via Protocol Message Size Overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27304"
},
{
"category": "external",
"summary": "RHBZ#2268269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27304"
}
],
"release_date": "2024-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-13T20:55:36+00:00",
"details": "If you are using an earlier version of RHACS 4.3, you are advised to upgrade to patch release 4.3.5.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pgx: SQL Injection via Protocol Message Size Overflow"
}
]
}
RHSA-2024_1321
Vulnerability from csaf_redhat - Published: 2024-03-13 20:55 - Updated: 2024-12-17 20:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security. The\nupdated image includes bug and security fixes.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release of RHACS 4.3.5 provides the following bug fix:\n\n* Fixed an issue where an upgrade to RHACS 4.3 from a previous version caused the Central component to enter a crash loop.\n\nIt provides the following security fixes:\n\n* pgx: SQL Injection via Protocol Message Size Overflow (CVE-2024-27304)\n* pgx: SQL Injection via Line Comment Creation (CVE-2024-27289)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1321",
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2268269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268269"
},
{
"category": "external",
"summary": "2268465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268465"
},
{
"category": "external",
"summary": "ROX-23133",
"url": "https://issues.redhat.com/browse/ROX-23133"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1321.json"
}
],
"title": "Red Hat Security Advisory: ACS 4.3 enhancement and security update",
"tracking": {
"current_release_date": "2024-12-17T20:48:37+00:00",
"generator": {
"date": "2024-12-17T20:48:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:1321",
"initial_release_date": "2024-03-13T20:55:36+00:00",
"revision_history": [
{
"date": "2024-03-13T20:55:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-13T20:55:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T20:48:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 4.3 for RHEL 8",
"product": {
"name": "RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f?arch=s390x\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product_id": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=4.3.5-4"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=4.3.5-3"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=4.3.5-1"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52?arch=ppc64le\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=4.3.5-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64 as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"relates_to_product_reference": "8Base-RHACS-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le as a component of RHACS 4.3 for RHEL 8",
"product_id": "8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le",
"relates_to_product_reference": "8Base-RHACS-4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27289",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2024-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pgx. SQL injection can occur when all of the following conditions are met in versions before 4.18.2 of pgx.\u00a0\r\n- The non-default simple protocol is used\r\n- A placeholder for a numeric value must be immediately preceded by a minus\r\n- There must be a second placeholder for a string value after the first placeholder\r\n- Both must be on the same line\r\n- Both parameter values must be user-controlled",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pgx: SQL Injection via Line Comment Creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27289"
},
{
"category": "external",
"summary": "RHBZ#2268465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27289"
},
{
"category": "external",
"summary": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df",
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"category": "external",
"summary": "https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p",
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2605",
"url": "https://pkg.go.dev/vuln/GO-2024-2605"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-13T20:55:36+00:00",
"details": "If you are using an earlier version of RHACS 4.3, you are advised to upgrade to patch release 4.3.5.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
},
{
"category": "workaround",
"details": "A possible mitigation is to not use the simple protocol or do not place a minus directly before a placeholder.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pgx: SQL Injection via Line Comment Creation"
},
{
"cve": "CVE-2024-27304",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268269"
}
],
"notes": [
{
"category": "description",
"text": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pgx: SQL Injection via Protocol Message Size Overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27304"
},
{
"category": "external",
"summary": "RHBZ#2268269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27304"
}
],
"release_date": "2024-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-13T20:55:36+00:00",
"details": "If you are using an earlier version of RHACS 4.3, you are advised to upgrade to patch release 4.3.5.",
"product_ids": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:17afebb6840002a1d56b22dd943061345a1eb8997d57572f1715706a708a0a94_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:2113a95c5a4d08d51c542121ae0e7be26761a4883f371b89a84ca604c662ba34_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2bbd43de9ad33f9daa04600dd2dc7e17ff7919c09bc56ca466af2332c867876_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:4ee4e4314d7044b567c0d914a873ef19d6290136524250d71707824ab50a6771_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:5fcc7a9793106c6ee9fad1d3181dd3a418c79defd389ad2f79dac540b61ecebe_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-rhel8@sha256:f2ca25a0d7ce845607c96077b896718a82f92810c90eec616b101a444180c2c4_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:23a88ee59f0c47503fa8ab6832e980121622f75abcc70734cf243299209cdd16_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2483c98f0d789d2f2b4ed9183ae38433bc5069d7ed59847a06b68f0994cadfd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:812df7cb4f9c976cd6869c82e0089969ff9c8492b4d9275c3dd2531e1e9beb75_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:362fe0f627380cbf5ead83c3e57400ca831d6d4d26ab416c17123d345de1a075_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:a1ccf6a8ffc1d2d6a6d04528353fbb4f3f0c039b546f439885c26364d5e3d1de_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-main-rhel8@sha256:edf704674e62f8651e78e1d2b916f36a3d6cad191d3366b97b0e6b9da2c908a1_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:5f2ad23bcf5d96c9cee2789f21df29ba7a63ddabf09140cecdcc21f04ea7cfcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-operator-bundle@sha256:e82ef850c57e49eab2d9b4d24e4892c23939ba0b3158bf37000f6f70c0843bd7_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:18468f5da200cfaf17e2f0c45066aa58141d63e4d622d35c06b4ca9d74812232_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:debc2bcf0938e41a61e48547d34ebecea2f5696cf4ef7c28577d4e30c52adee0_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-rhel8-operator@sha256:f6e627cf9449bdc8003c636db8966c0076e51f071124764f26ffb94449d9e69f_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:87bd0d8ae7c5f217f181df81188fff1e1c1f5c06a040a6e376fb26522a3c13d8_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9a1438591ff32bcce16badc7630e5d330f7b7bd453896c79589061686f8f04a9_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b1f1169ba6a7b36297db7cf495ee18d3eb32c3ee3882cdb470f13146aea056fb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a3f2bc6b6e06314238a9e030c9bc9b640c0ad71709030863ddebcfe7bf12ea1d_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aa05620232be93fea76d2ca7aa3be5d0db4153cad4e718ab4ed91b8964d52dde_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:eec6502d809be469d4b0b310ef1fed9fe9c59ea3ecc6583ab8893b58814f5a9d_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:605af3ee40fa2a179c369cff28563908cf3b420651c7aef8eef3837977299903_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82609a23ba6e2b6c819daaddb330c3e1b7ff0f5e16630ebb6e3db0a9af236f88_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fa03464d54bf4d31623faae0566b2553f42680b60b4e803d175f898048087bcb_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:136f2a4ed9ee5ebbcb9d74ab0a3eb2c65d3a2b53f9eefaae65bed7b6e11617bb_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1ae645988b18f220896c3c57c45e83dfca1ba13ab531543eddd7b85bbdd41ac6_ppc64le",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-rhel8@sha256:284fe7202809723ce52fc3d802927453e6c1943f79ce0761b5f86a8150324cba_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0fd9c60d08bc078d18bf15243d13e284fc6e794187240a9414d3afde69a43c0f_s390x",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:be0cf8eec9290414cd532be40f1916e977dbd82625ee09f7d45b48172221f6b3_amd64",
"8Base-RHACS-4.3:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f0d9e9e8c32dd905e2304dfb686114b3430b6babc88f2abaafd7569403870f52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pgx: SQL Injection via Protocol Message Size Overflow"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
FKIE_CVE-2024-27304
Vulnerability from fkie_nvd - Published: 2024-03-06 19:15 - Updated: 2025-12-04 17:33| Vendor | Product | Version | |
|---|---|---|---|
| pgproto3_project | pgproto3 | * | |
| pgx_project | pgx | * | |
| pgx_project | pgx | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgproto3_project:pgproto3:*:*:*:*:*:go:*:*",
"matchCriteriaId": "595DDCC9-AC88-4702-8771-EE3C382AAB9B",
"versionEndExcluding": "2.3.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pgx_project:pgx:*:*:*:*:*:go:*:*",
"matchCriteriaId": "A544EDA8-8EF2-407D-8534-2AF89534F7AC",
"versionEndExcluding": "4.18.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pgx_project:pgx:*:*:*:*:*:go:*:*",
"matchCriteriaId": "FC1EF367-3F2F-4280-BEBB-CE1875BFAC3B",
"versionEndExcluding": "5.5.4",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size."
},
{
"lang": "es",
"value": "pgx es un controlador PostgreSQL y un conjunto de herramientas para Go. La inyecci\u00f3n de SQL puede ocurrir si un atacante puede hacer que una sola consulta o mensaje de enlace supere los 4 GB de tama\u00f1o. Un desbordamiento de enteros en el tama\u00f1o del mensaje calculado puede provocar que un mensaje grande se env\u00ede como varios mensajes bajo el control del atacante. El problema se resuelve en v4.18.2 y v5.5.4. Como soluci\u00f3n alternativa, rechace la entrada del usuario lo suficientemente grande como para provocar que una sola consulta o mensaje vinculado supere los 4 GB de tama\u00f1o."
}
],
"id": "CVE-2024-27304",
"lastModified": "2025-12-04T17:33:44.540",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-03-06T19:15:08.767",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
},
{
"source": "security-advisories@github.com",
"tags": [
"Press/Media Coverage"
],
"url": "https://www.youtube.com/watch?v=Tfg1B8u1yvE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
},
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GHSA-MRWW-27VC-GGHV
Vulnerability from github – Published: 2024-03-04 20:43 – Updated: 2024-12-12 22:30Impact
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Patches
The problem is resolved in v4.18.2 and v5.5.4.
Workarounds
Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/jackc/pgx"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/jackc/pgx"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.5.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/jackc/pgx/v4"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/jackc/pgx/v5"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.5.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-27304"
],
"database_specific": {
"cwe_ids": [
"CWE-190",
"CWE-89"
],
"github_reviewed": true,
"github_reviewed_at": "2024-03-04T20:43:24Z",
"nvd_published_at": "2024-03-06T19:15:08Z",
"severity": "HIGH"
},
"details": "### Impact\n\nSQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control.\n\n### Patches\n\nThe problem is resolved in v4.18.2 and v5.5.4.\n\n### Workarounds\n\nReject user input large enough to cause a single query or bind message to exceed 4 GB in size.\n",
"id": "GHSA-mrww-27vc-gghv",
"modified": "2024-12-12T22:30:36Z",
"published": "2024-03-04T20:43:24Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"type": "WEB",
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27304"
},
{
"type": "WEB",
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"type": "WEB",
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"type": "WEB",
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"type": "WEB",
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"type": "PACKAGE",
"url": "https://github.com/jackc/pgx"
},
{
"type": "WEB",
"url": "https://www.youtube.com/watch?v=Tfg1B8u1yvE"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "pgx SQL Injection via Protocol Message Size Overflow"
}
MSRC_CVE-2024-27304
Vulnerability from csaf_microsoft - Published: 2024-03-02 08:00 - Updated: 2024-06-30 07:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27304 pgx SQL Injection via Protocol Message Size Overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-27304.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "pgx SQL Injection via Protocol Message Size Overflow",
"tracking": {
"current_release_date": "2024-06-30T07:00:00.000Z",
"generator": {
"date": "2025-10-20T01:08:04.824Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-27304",
"initial_release_date": "2024-03-02T08:00:00.000Z",
"revision_history": [
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.28.5-5",
"product": {
"name": "\u003ccbl2 telegraf 1.28.5-5",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.28.5-5",
"product": {
"name": "cbl2 telegraf 1.28.5-5",
"product_id": "17405"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.31.0-1",
"product": {
"name": "\u003cazl3 telegraf 1.31.0-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.31.0-1",
"product": {
"name": "azl3 telegraf 1.31.0-1",
"product_id": "17758"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.29.4-1",
"product": {
"name": "\u003cazl3 telegraf 1.29.4-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.29.4-1",
"product": {
"name": "azl3 telegraf 1.29.4-1",
"product_id": "18164"
}
}
],
"category": "product_name",
"name": "telegraf"
},
{
"category": "product_name",
"name": "cbl2 telegraf 1.29.4-15",
"product": {
"name": "cbl2 telegraf 1.29.4-15",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.28.5-5 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.28.5-5 as a component of CBL Mariner 2.0",
"product_id": "17405-17086"
},
"product_reference": "17405",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.31.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.31.0-1 as a component of Azure Linux 3.0",
"product_id": "17758-17084"
},
"product_reference": "17758",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.29.4-15 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.29.4-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.29.4-1 as a component of Azure Linux 3.0",
"product_id": "18164-17084"
},
"product_reference": "18164",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27304",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17086-1"
]
}
],
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17405-17086",
"17758-17084",
"18164-17084"
],
"known_affected": [
"17086-4",
"17084-3",
"17084-2"
],
"known_not_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27304 pgx SQL Injection via Protocol Message Size Overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-27304.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-30T07:00:00.000Z",
"details": "1.28.5-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-06-30T07:00:00.000Z",
"details": "1.31.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-4",
"17084-3",
"17084-2"
]
}
],
"title": "pgx SQL Injection via Protocol Message Size Overflow"
}
]
}
WID-SEC-W-2024-0626
Vulnerability from csaf_certbund - Published: 2024-03-13 23:00 - Updated: 2024-10-16 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um Dateien zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0626 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0626.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0626 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0626"
},
{
"category": "external",
"summary": "RedHatSecurity Advisory vom 2024-03-13",
"url": "https://access.redhat.com/errata/RHSA-2024:1321"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-BD8FE42929 vom 2024-07-06",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-bd8fe42929"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7922 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:7922"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7944 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:7944"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen erm\u00f6glichen Manipulation von Dateien",
"tracking": {
"current_release_date": "2024-10-16T22:00:00.000+00:00",
"generator": {
"date": "2024-10-17T08:16:56.305+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0626",
"initial_release_date": "2024-03-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-16T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "Advanced Cluster Security \u003c4.3",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security \u003c4.3",
"product_id": "T033490"
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security 4.3",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security 4.3",
"product_id": "T033490-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security__4.3"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27289",
"notes": [
{
"category": "description",
"text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf mehrere Anf\u00e4lligeiten f\u00fcr SQL-Injections zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um eine SQL-Injection durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T033490",
"74185"
]
},
"release_date": "2024-03-13T23:00:00.000+00:00",
"title": "CVE-2024-27289"
},
{
"cve": "CVE-2024-27304",
"notes": [
{
"category": "description",
"text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf mehrere Anf\u00e4lligeiten f\u00fcr SQL-Injections zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um eine SQL-Injection durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T033490",
"74185"
]
},
"release_date": "2024-03-13T23:00:00.000+00:00",
"title": "CVE-2024-27304"
}
]
}
GSD-2024-27304
Vulnerability from gsd - Updated: 2024-02-23 06:03{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-27304"
],
"details": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.",
"id": "GSD-2024-27304",
"modified": "2024-02-23T06:03:43.566567Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2024-27304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "pgx",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003c 4.18.2"
},
{
"version_affected": "=",
"version_value": "\u003e= 5.0.0, \u003c 5.5.4"
}
]
}
}
]
},
"vendor_name": "jackc"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-89",
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
}
]
},
{
"description": [
{
"cweId": "CWE-190",
"lang": "eng",
"value": "CWE-190: Integer Overflow or Wraparound"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv",
"refsource": "MISC",
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
},
{
"name": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8",
"refsource": "MISC",
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"name": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007",
"refsource": "MISC",
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"name": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4",
"refsource": "MISC",
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"name": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8",
"refsource": "MISC",
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"name": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df",
"refsource": "MISC",
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
}
]
},
"source": {
"advisory": "GHSA-mrww-27vc-gghv",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker\u0027s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size."
}
],
"id": "CVE-2024-27304",
"lastModified": "2024-03-06T21:42:48.053",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-03-06T19:15:08.767",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.