var-202201-1251
Vulnerability from variot
graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version v1.3.0
. The only known workaround for this issue is to disable the graphql.MaxDepth
option from your schema which is not recommended. graphql-go Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state.
The following advisory data is extracted from:
https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0735.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
- Packet Storm Staff
==================================================================== Red Hat Security Advisory
Synopsis: Critical: OpenShift Container Platform 4.14.12 bug fix and security update Advisory ID: RHSA-2024:0735-03 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2024:0735 Issue date: 2024-02-14 Revision: 03 CVE Names: CVE-2022-21708 ====================================================================
Summary:
Red Hat OpenShift Container Platform release 4.14.12 is now available with updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.14.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.14.12. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2024:0738
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.14/release_notes/ocp-4-14-release-notes.html
Security Fix(es):
- go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients (CVE-2023-49569)
- go-git: Maliciously crafted Git server replies can cause DoS on go-git clients (CVE-2023-49568)
- graphql-go: Denial of service via stack overflow panics (CVE-2022-21708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.14 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.14/updating/updating_a_cluster/updating-cluster-cli.html
Solution:
CVEs:
CVE-2022-21708
References:
https://access.redhat.com/security/updates/classification/#critical https://bugzilla.redhat.com/show_bug.cgi?id=2045014 https://bugzilla.redhat.com/show_bug.cgi?id=2258143 https://bugzilla.redhat.com/show_bug.cgi?id=2258165 https://issues.redhat.com/browse/OCPBUGS-20180 https://issues.redhat.com/browse/OCPBUGS-20547 https://issues.redhat.com/browse/OCPBUGS-26526 https://issues.redhat.com/browse/OCPBUGS-26527 https://issues.redhat.com/browse/OCPBUGS-27072 https://issues.redhat.com/browse/OCPBUGS-27157 https://issues.redhat.com/browse/OCPBUGS-27419 https://issues.redhat.com/browse/OCPBUGS-27773 https://issues.redhat.com/browse/OCPBUGS-28238 https://issues.redhat.com/browse/OCPBUGS-28379 https://issues.redhat.com/browse/OCPBUGS-28384 https://issues.redhat.com/browse/OCPBUGS-28789 https://issues.redhat.com/browse/OCPBUGS-28823 https://issues.redhat.com/browse/OCPBUGS-28871 https://issues.redhat.com/browse/OCPBUGS-28949 https://issues.redhat.com/browse/OCPBUGS-28950 https://issues.redhat.com/browse/OCPBUGS-28951 https://issues.redhat.com/browse/OCPBUGS-28952 https://issues.redhat.com/browse/OCPBUGS-28957 https://issues.redhat.com/browse/OCPBUGS-29030 https://issues.redhat.com/browse/OCPBUGS-29034 https://issues.redhat.com/browse/OCPBUGS-7262
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "graphql-go", "scope": "lt", "trust": 1.6, "vendor": "graphql go", "version": "1.3.0" }, { "model": "graphql-go", "scope": "eq", "trust": 0.8, "vendor": "graphql go", "version": "1.3.0" }, { "model": "graphql-go", "scope": "eq", "trust": 0.8, "vendor": "graphql go", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:graphql-go_project:graphql-go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.3.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-21708" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "177111" } ], "trust": 0.1 }, "cve": "CVE-2022-21708", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-21708", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-07238", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2022-004034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-21708", "trust": 1.8, "value": "MEDIUM" }, { "author": "security-advisories@github.com", "id": "CVE-2022-21708", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-07238", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-2180", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-21708", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "db": "NVD", "id": "CVE-2022-21708" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version `v1.3.0`. The only known workaround for this issue is to disable the `graphql.MaxDepth` option from your schema which is not recommended. graphql-go Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. \n\nThe following advisory data is extracted from:\n\nhttps://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0735.json\n\nRed Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat\u0027s archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. \n\n- Packet Storm Staff\n\n\n\n\n====================================================================\nRed Hat Security Advisory\n\nSynopsis: Critical: OpenShift Container Platform 4.14.12 bug fix and security update\nAdvisory ID: RHSA-2024:0735-03\nProduct: Red Hat OpenShift Enterprise\nAdvisory URL: https://access.redhat.com/errata/RHSA-2024:0735\nIssue date: 2024-02-14\nRevision: 03\nCVE Names: CVE-2022-21708\n====================================================================\n\nSummary: \n\nRed Hat OpenShift Container Platform release 4.14.12 is now available with\nupdates to packages and images that fix several bugs and add enhancements. \n\nThis release includes a security update for Red Hat OpenShift Container\nPlatform 4.14. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n\n\n\nDescription:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.14.12. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2024:0738\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.14/release_notes/ocp-4-14-release-notes.html\n\nSecurity Fix(es):\n\n* go-git: Maliciously crafted Git server replies can lead to path traversal\nand RCE on go-git clients (CVE-2023-49569)\n* go-git: Maliciously crafted Git server replies can cause DoS on go-git\nclients (CVE-2023-49568)\n* graphql-go: Denial of service via stack overflow panics (CVE-2022-21708)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. \nAll OpenShift Container Platform 4.14 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.14/updating/updating_a_cluster/updating-cluster-cli.html\n\n\nSolution:\n\n\n\nCVEs:\n\nCVE-2022-21708\n\nReferences:\n\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2045014\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2258143\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2258165\nhttps://issues.redhat.com/browse/OCPBUGS-20180\nhttps://issues.redhat.com/browse/OCPBUGS-20547\nhttps://issues.redhat.com/browse/OCPBUGS-26526\nhttps://issues.redhat.com/browse/OCPBUGS-26527\nhttps://issues.redhat.com/browse/OCPBUGS-27072\nhttps://issues.redhat.com/browse/OCPBUGS-27157\nhttps://issues.redhat.com/browse/OCPBUGS-27419\nhttps://issues.redhat.com/browse/OCPBUGS-27773\nhttps://issues.redhat.com/browse/OCPBUGS-28238\nhttps://issues.redhat.com/browse/OCPBUGS-28379\nhttps://issues.redhat.com/browse/OCPBUGS-28384\nhttps://issues.redhat.com/browse/OCPBUGS-28789\nhttps://issues.redhat.com/browse/OCPBUGS-28823\nhttps://issues.redhat.com/browse/OCPBUGS-28871\nhttps://issues.redhat.com/browse/OCPBUGS-28949\nhttps://issues.redhat.com/browse/OCPBUGS-28950\nhttps://issues.redhat.com/browse/OCPBUGS-28951\nhttps://issues.redhat.com/browse/OCPBUGS-28952\nhttps://issues.redhat.com/browse/OCPBUGS-28957\nhttps://issues.redhat.com/browse/OCPBUGS-29030\nhttps://issues.redhat.com/browse/OCPBUGS-29034\nhttps://issues.redhat.com/browse/OCPBUGS-7262\n\n", "sources": [ { "db": "NVD", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "PACKETSTORM", "id": "177111" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-21708", "trust": 4.0 }, { "db": "JVNDB", "id": "JVNDB-2022-004034", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-07238", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-2180", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-21708", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "177111", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "PACKETSTORM", "id": "177111" }, { "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "id": "VAR-202201-1251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" } ], "trust": 0.975 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" } ] }, "last_update_date": "2024-02-16T22:38:44.331000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Denial\u00a0of\u00a0Service\u00a0caused\u00a0by\u00a0a\u00a0bug\u00a0in\u00a0the\u00a0MaxDepth\u00a0schema\u00a0option", "trust": 0.8, "url": "https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe" }, { "title": "Patch for graphql-go denial of service vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316476" }, { "title": "graphql-go Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=179768" }, { "title": "Red Hat: CVE-2022-21708", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2022-21708" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "CNNVD", "id": "CNNVD-202201-2180" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-674", "trust": 1.0 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://github.com/graph-gophers/graphql-go/security/advisories/ghsa-mh3m-8c74-74xh" }, { "trust": 1.7, "url": "https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21708" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/674.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21708" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258165" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhba-2024:0738" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28957" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045014" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28238" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28823" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28949" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-27072" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28384" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-29030" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28952" }, { "trust": 0.1, "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0735.json" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28871" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258143" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-27157" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-20180" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-27773" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28379" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.14/updating/updating_a_cluster/updating-cluster-cli.html" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-26526" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-7262" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28789" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-20547" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2024:0735" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-29034" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28950" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.14/release_notes/ocp-4-14-release-notes.html" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-27419" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-28951" }, { "trust": 0.1, "url": "https://issues.redhat.com/browse/ocpbugs-26527" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "PACKETSTORM", "id": "177111" }, { "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-07238" }, { "db": "VULMON", "id": "CVE-2022-21708" }, { "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "db": "PACKETSTORM", "id": "177111" }, { "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "db": "NVD", "id": "CVE-2022-21708" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-27T00:00:00", "db": "CNVD", "id": "CNVD-2022-07238" }, { "date": "2022-01-21T00:00:00", "db": "VULMON", "id": "CVE-2022-21708" }, { "date": "2023-03-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "date": "2024-02-14T15:07:09", "db": "PACKETSTORM", "id": "177111" }, { "date": "2022-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "date": "2022-01-21T23:15:08.457000", "db": "NVD", "id": "CVE-2022-21708" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-27T00:00:00", "db": "CNVD", "id": "CNVD-2022-07238" }, { "date": "2023-07-24T00:00:00", "db": "VULMON", "id": "CVE-2022-21708" }, { "date": "2023-03-16T07:32:00", "db": "JVNDB", "id": "JVNDB-2022-004034" }, { "date": "2023-07-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2180" }, { "date": "2023-07-24T13:52:44.550000", "db": "NVD", "id": "CVE-2022-21708" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2180" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "graphql-go\u00a0 Resource exhaustion vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004034" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2180" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.