Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-40094
Vulnerability from cvelistv5
Published
2024-07-30 00:00
Modified
2024-11-20 20:13
Severity ?
EPSS score ?
Summary
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-30T14:42:03.528958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-20T20:13:40.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-30T06:24:07.203520", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40094", "datePublished": "2024-07-30T00:00:00", "dateReserved": "2024-07-05T00:00:00", "dateUpdated": "2024-11-20T20:13:40.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-40094\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-07-30T07:15:01.840\",\"lastModified\":\"2024-11-21T09:30:56.560\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.\"},{\"lang\":\"es\",\"value\":\" GraphQL Java (tambi\u00e9n conocido como graphql-java) anterior a 21.5 no considera adecuadamente los ExecutableNormalizedFields (ENF) como parte de la prevenci\u00f3n de la denegaci\u00f3n de servicio mediante consultas de introspecci\u00f3n. 20.9 y 19.11 tambi\u00e9n son versiones fijas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"references\":[{\"url\":\"https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/discussions/3641\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/pull/3539\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v19.11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v20.9\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v21.5\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/discussions/3641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/pull/3539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v19.11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v20.9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v21.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-h9mq-f6q5-6c8m
Vulnerability from github
Published
2024-07-30 09:31
Modified
2024-07-30 15:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service
Details
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "19.11" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "20.0" }, { "fixed": "20.9" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "21.0" }, { "fixed": "21.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-40094" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2024-07-30T15:08:48Z", "nvd_published_at": "2024-07-30T07:15:01Z", "severity": "HIGH" }, "details": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.", "id": "GHSA-h9mq-f6q5-6c8m", "modified": "2024-07-30T15:08:48Z", "published": "2024-07-30T09:31:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/16c159111507ef04d7e1839b2c23281d90c42b2b" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/469caf6ee600ab6709ad5e8a06f371fe2ef3b8dd" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/fc6f304e66cab18b6d06a80c7009524938939a03" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service" }
rhsa-2024_8329
Vulnerability from csaf_redhat
Published
2024-10-22 15:40
Modified
2024-12-18 04:16
Summary
Red Hat Security Advisory: Red Hat build of Cryostat security update
Notes
Topic
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Security Fix(es):
* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nSecurity Fix(es):\n\n* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)\n* golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)\n* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)\n* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8329", "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8329.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Cryostat security update", "tracking": { "current_release_date": "2024-12-18T04:16:38+00:00", "generator": { "date": "2024-12-18T04:16:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8329", "initial_release_date": "2024-10-22T15:40:25+00:00", "revision_history": [ { "date": "2024-10-22T15:40:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-22T15:40:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T04:16:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cryostat 3 on RHEL 8", "product": { "name": "Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:cryostat:3::el8" } } } ], "category": "product_family", "name": "Cryostat" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "relates_to_product_reference": "8Base-Cryostat-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34155", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:06.929766+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310527" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34155" }, { "category": "external", "summary": "RHBZ#2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155" }, { "category": "external", "summary": "https://go.dev/cl/611238", "url": "https://go.dev/cl/611238" }, { "category": "external", "summary": "https://go.dev/issue/69138", "url": "https://go.dev/issue/69138" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3105", "url": "https://pkg.go.dev/vuln/GO-2024-3105" } ], "release_date": "2024-09-06T21:15:11.947000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion" }, { "cve": "CVE-2024-34156", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:09.377905+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310528" } ], "notes": [ { "category": "description", "text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", "title": "Vulnerability description" }, { "category": "summary", "text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34156" }, { "category": "external", "summary": "RHBZ#2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156" }, { "category": "external", "summary": "https://go.dev/cl/611239", "url": "https://go.dev/cl/611239" }, { "category": "external", "summary": "https://go.dev/issue/69139", "url": "https://go.dev/issue/69139" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3106", "url": "https://pkg.go.dev/vuln/GO-2024-3106" } ], "release_date": "2024-09-06T21:15:12.020000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-34158", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2024-09-06T21:20:12.126400+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310529" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34158" }, { "category": "external", "summary": "RHBZ#2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158" }, { "category": "external", "summary": "https://go.dev/cl/611240", "url": "https://go.dev/cl/611240" }, { "category": "external", "summary": "https://go.dev/issue/69141", "url": "https://go.dev/issue/69141" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3107", "url": "https://pkg.go.dev/vuln/GO-2024-3107" } ], "release_date": "2024-09-06T21:15:12.083000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" } ] }
rhsa-2024_7676
Vulnerability from csaf_redhat
Published
2024-10-10 13:43
Modified
2024-12-06 13:14
Summary
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update
Notes
Topic
An update is now available for Red Hat build of Quarkus.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.
Details
This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes
page listed in the References section.
Security Fix(es):
* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)
* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)
* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Quarkus. \nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability. For\nmore information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes\npage listed in the References section.\n\nSecurity Fix(es):\n\n* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)\n\n* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\n* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7676", "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7676.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update", "tracking": { "current_release_date": "2024-12-06T13:14:07+00:00", "generator": { "date": "2024-12-06T13:14:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.2" } }, "id": "RHSA-2024:7676", "initial_release_date": "2024-10-10T13:43:59+00:00", "revision_history": [ { "date": "2024-10-10T13:43:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-10T13:43:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-06T13:14:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Quarkus 3.2", "product": { "name": "Red Hat build of Quarkus 3.2", "product_id": "Red Hat build of Quarkus 3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:quarkus:3.2::el8" } } } ], "category": "product_family", "name": "Red Hat build of Quarkus" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44549", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2024-10-01T01:34:34.576000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2315808" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Sling Commons Messaging Mail(angus-mail), which provides a simple interface for sending emails via SMTPS in OSGi, does not offer an option to enable server identity checks, leaving connections vulnerable to \"man-in-the-middle\" attacks and can allow insecure email communication.", "title": "Vulnerability description" }, { "category": "summary", "text": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability should be considered of important severity rather than moderate because it directly impacts the integrity and confidentiality of email communications over SMTPS. By disabling server identity checks, it leaves the communication channel vulnerable to \"man-in-the-middle\" (MITM) attacks, where an attacker could intercept, alter, or eavesdrop on email traffic by impersonating the legitimate mail server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44549" }, { "category": "external", "summary": "RHBZ#2315808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44549", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549" } ], "release_date": "2023-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.