Action not permitted
Modal body text goes here.
cve-2024-40094
Vulnerability from cvelistv5
Published
2024-07-30 00:00
Modified
2024-11-20 20:13
Severity ?
EPSS score ?
Summary
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-30T14:42:03.528958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-20T20:13:40.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "tags": [ "x_transferred" ], "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-30T06:24:07.203520", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "url": "https://github.com/graphql-java/graphql-java/pull/3539" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40094", "datePublished": "2024-07-30T00:00:00", "dateReserved": "2024-07-05T00:00:00", "dateUpdated": "2024-11-20T20:13:40.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-40094\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-07-30T07:15:01.840\",\"lastModified\":\"2024-07-30T13:32:45.943\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.\"},{\"lang\":\"es\",\"value\":\" GraphQL Java (tambi\u00e9n conocido como graphql-java) anterior a 21.5 no considera adecuadamente los ExecutableNormalizedFields (ENF) como parte de la prevenci\u00f3n de la denegaci\u00f3n de servicio mediante consultas de introspecci\u00f3n. 20.9 y 19.11 tambi\u00e9n son versiones fijas.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/discussions/3641\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/pull/3539\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v19.11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v20.9\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/graphql-java/graphql-java/releases/tag/v21.5\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2025_0664
Vulnerability from csaf_redhat
Published
2025-01-23 13:02
Modified
2025-03-28 11:01
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.35.0 security update & enhancements
Notes
Topic
Release of OpenShift Serverless Logic 1.35.0
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release includes security, bug fixes, and enhancements.
Security Fix(es):
* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
* openshift-serverless-1-logic-rhel8-operator-container: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* path-to-regexp: Backtracking regular expressions cause ReDoS (CVE-2024-45296)
For more details about the security issues, including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE pages listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Logic 1.35.0\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release includes security, bug fixes, and enhancements.\n\nSecurity Fix(es):\n\n* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\n* openshift-serverless-1-logic-rhel8-operator-container: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\n* path-to-regexp: Backtracking regular expressions cause ReDoS (CVE-2024-45296)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:0664", "url": "https://access.redhat.com/errata/RHSA-2025:0664" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "2310908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310908" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0664.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.35.0 security update \u0026 enhancements", "tracking": { "current_release_date": "2025-03-28T11:01:29+00:00", "generator": { "date": "2025-03-28T11:01:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2025:0664", "initial_release_date": "2025-01-23T13:02:37+00:00", "revision_history": [ { "date": "2025-01-23T13:02:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-01-23T13:02:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-28T11:01:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-Openshift-Serverless-1.35", "product": { "name": "8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_serverless:1.35::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "product": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "product_id": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "product": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "product_id": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-postgresql-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "product": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "product_id": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "product": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "product_id": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-postgresql-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "product": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "product_id": "openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-operator-bundle\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "product": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "product_id": "openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-rhel8-operator\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "product": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "product_id": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-builder-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le", "product": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le", "product_id": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-devmode-rhel8\u0026tag=1.35.0-6" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "product": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "product_id": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "product": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "product_id": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-postgresql-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "product": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "product_id": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "product": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "product_id": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-postgresql-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "product": { "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "product_id": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8\u0026tag=1.35.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "product": { "name": "openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "product_id": "openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-management-console-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "product": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "product_id": "openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-operator-bundle\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "product": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "product_id": "openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-rhel8-operator\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "product": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "product_id": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-builder-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "product": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "product_id": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "product_identification_helper": { "purl": "pkg:oci/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-devmode-rhel8\u0026tag=1.35.0-6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "product": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "product_id": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "product": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "product_id": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-data-index-postgresql-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "product": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "product_id": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-ephemeral-rhel8\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "product": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "product_id": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-jobs-service-postgresql-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "product": { "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "product_id": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8\u0026tag=1.35.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "product": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "product_id": "openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-operator-bundle\u0026tag=1.35.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "product": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "product_id": "openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-rhel8-operator\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "product": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "product_id": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-builder-rhel8\u0026tag=1.35.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "product": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "product_id": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "product_identification_helper": { "purl": "pkg:oci/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-serverless-1/logic-swf-devmode-rhel8\u0026tag=1.35.0-6" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64" }, "product_reference": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64" }, "product_reference": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le" }, "product_reference": "openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le" }, "product_reference": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64" }, "product_reference": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64" }, "product_reference": "openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le" }, "product_reference": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64" }, "product_reference": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64" }, "product_reference": "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64" }, "product_reference": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64" }, "product_reference": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le" }, "product_reference": "openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64" }, "product_reference": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64" }, "product_reference": "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64" }, "product_reference": "openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64" }, "product_reference": "openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le" }, "product_reference": "openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64" }, "product_reference": "openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64" }, "product_reference": "openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64" }, "product_reference": "openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le" }, "product_reference": "openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64" }, "product_reference": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64" }, "product_reference": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le" }, "product_reference": "openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64" }, "product_reference": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64 as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64" }, "product_reference": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "relates_to_product_reference": "8Base-RHOSS-1.35" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le as a component of 8Base-Openshift-Serverless-1.35", "product_id": "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" }, "product_reference": "openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le", "relates_to_product_reference": "8Base-RHOSS-1.35" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268046" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "RHBZ#2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786" }, { "category": "external", "summary": "https://go.dev/cl/569356", "url": "https://go.dev/cl/569356" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/", "url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2611", "url": "https://pkg.go.dev/vuln/GO-2024-2611" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-23T13:02:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:0664" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-23T13:02:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:0664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" }, { "cve": "CVE-2024-45296", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2024-09-09T19:20:18.127723+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310908" } ], "notes": [ { "category": "description", "text": "A flaw was found in path-to-regexp package, where it turns path strings into regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single-threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "path-to-regexp: Backtracking regular expressions cause ReDoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45296" }, { "category": "external", "summary": "RHBZ#2310908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45296" }, { "category": "external", "summary": "https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476f", "url": "https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476f" }, { "category": "external", "summary": "https://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6", "url": "https://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6" }, { "category": "external", "summary": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j", "url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j" } ], "release_date": "2024-09-09T19:15:13.330000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-01-23T13:02:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:0664" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:56afce3767c0107b1d8eddb0e11349b9d590c22ebfee7a549f627c49136992d4_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:83e0e9053d0378243b998913a1eeb1389975ca206795db24b353ef3d0a033cad_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-ephemeral-rhel8@sha256:d7e430549b5bb731d2dcdfe035eaad09749a715a20fb317f0a298c2816416993_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:329594c53c4a745faf4d0cf5e545d67330c0aeae6ac00b64e9ec0f8ce0df184b_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:8f465cefedf8fa0ac5411984b47389e512c54f038be7ea6937f11b33a0ae544d_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-data-index-postgresql-rhel8@sha256:ef1070b9c74786f739aeca2bbb9e3a47737fe6fb94b914a66e87919dfa9d6e74_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:499153657dee98797271613cc36f621287c07ef217da630a05d8a97d89f62fd7_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:5821f6a8b84797f2786d88be10bcd064576e589ea3c57d1db90d100007322fd8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-ephemeral-rhel8@sha256:e072472c48308e24fe8065837277a6886bd52ece5209dfcaf91bd29390d1f46a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:2ca2a45af55aef2a611e42106ee1deec6b77c143b41e4eabdd845b51661eb7e6_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:967bd9e6268ec3cc2ce974e6f43fa0b56773000dc74ea6330a26ca31d2b15df5_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-jobs-service-postgresql-rhel8@sha256:a71f103ea3d12753fd12e7e760729d2ded4fa8db9a297d3422857b6071dcac78_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:3eaa8f77385fca49bf0e8b17aa27b3b2cbfc41225e3c02d49205fd98c9a7ad03_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8@sha256:89282abb48abfecd20634112d03450452c795a33c22f43dca2582cb30055b490_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-management-console-rhel8@sha256:b78d197751ef9cfdbd57d682f3478f87c6bb4786a72c72f3e33762576ce0a204_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:13d391b2a921dcc79d38a452dfd3924c77a972a7cedae2a547a3820345c606c8_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:8f7be86799ab9e12431d755cf8fd7882b3bb870ed698c9b5ba51929d4cc9d01d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-operator-bundle@sha256:a1d1995b2b178a1242d41f1e8df4382d14317623ac05b91bf6be971f0ac5a227_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:35fa091442aea7a9b5bbff8581d51a954fc8a1c0d9c411de91ec547cb6b3d762_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:cb4dbd05449296fe6cdd8c5b54375b4f856d4d4ba4a0b634df370a248ba19820_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-rhel8-operator@sha256:f7d5c366b734c40aef8aefbe3e656fc633ae6c9011a0fffd65f01506067a695f_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:033cb5cf3fedea187bd9f72aa45ff081f7c9825b4e4235010172ce6a12610e8a_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:1533005bf710c95dca7b0b514f72df873f4a9c510697c76804eec32a5b5f057a_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-builder-rhel8@sha256:a1e75bc27adcbc4df57f4fdc289ca2eafd0fef9b87b2a78fcc523860a40aea0d_ppc64le", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:35877fb2aae353f2ed57f7a975a45f510fdf0cf8dc0070e52b47ed590af0f0b8_amd64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:7438efe5d9db033e410419ec6e7620a268192762a65d825c91950cd4a629c46f_arm64", "8Base-RHOSS-1.35:openshift-serverless-1/logic-swf-devmode-rhel8@sha256:ff2bc62c20412ba5e7dcb4c71f9b6c56a250766e59031444461e5f4d626aa106_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "path-to-regexp: Backtracking regular expressions cause ReDoS" } ] }
rhsa-2024_7676
Vulnerability from csaf_redhat
Published
2024-10-10 13:43
Modified
2025-03-28 10:59
Summary
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update
Notes
Topic
An update is now available for Red Hat build of Quarkus.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.
Details
This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes
page listed in the References section.
Security Fix(es):
* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)
* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)
* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Quarkus. \nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability. For\nmore information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Quarkus 3.2.12.SP1 contains security updates. For more information, see the release notes\npage listed in the References section.\n\nSecurity Fix(es):\n\n* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)\n\n* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\n* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7676", "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7676.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12.SP1 Security Update", "tracking": { "current_release_date": "2025-03-28T10:59:52+00:00", "generator": { "date": "2025-03-28T10:59:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2024:7676", "initial_release_date": "2024-10-10T13:43:59+00:00", "revision_history": [ { "date": "2024-10-10T13:43:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-10T13:43:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-28T10:59:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Quarkus 3.2", "product": { "name": "Red Hat build of Quarkus 3.2", "product_id": "Red Hat build of Quarkus 3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:quarkus:3.2::el8" } } } ], "category": "product_family", "name": "Red Hat build of Quarkus" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44549", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2024-10-01T01:34:34.576000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2315808" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Sling Commons Messaging Mail(angus-mail), which provides a simple interface for sending emails via SMTPS in OSGi, does not offer an option to enable server identity checks, leaving connections vulnerable to \"man-in-the-middle\" attacks and can allow insecure email communication.", "title": "Vulnerability description" }, { "category": "summary", "text": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability should be considered of important severity rather than moderate because it directly impacts the integrity and confidentiality of email communications over SMTPS. By disabling server identity checks, it leaves the communication channel vulnerable to \"man-in-the-middle\" (MITM) attacks, where an attacker could intercept, alter, or eavesdrop on email traffic by impersonating the legitimate mail server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44549" }, { "category": "external", "summary": "RHBZ#2315808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44549", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549" } ], "release_date": "2023-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T13:43:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7676" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "Red Hat build of Quarkus 3.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
rhsa-2024_8329
Vulnerability from csaf_redhat
Published
2024-10-22 15:40
Modified
2025-03-28 11:04
Summary
Red Hat Security Advisory: Red Hat build of Cryostat security update
Notes
Topic
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.
Security Fix(es):
* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "An update is now available for the Red Hat build of Cryostat 3 on RHEL 8.\n\nSecurity Fix(es):\n\n* golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)\n* golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)\n* golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)\n* com.graphql-java/graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8329", "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8329.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Cryostat security update", "tracking": { "current_release_date": "2025-03-28T11:04:49+00:00", "generator": { "date": "2025-03-28T11:04:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2024:8329", "initial_release_date": "2024-10-22T15:40:25+00:00", "revision_history": [ { "date": "2024-10-22T15:40:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-22T15:40:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-28T11:04:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cryostat 3 on RHEL 8", "product": { "name": "Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:cryostat:3::el8" } } } ], "category": "product_family", "name": "Cryostat" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425?arch=arm64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_id": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-db-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_id": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-grafana-dashboard-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_id": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_id": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-reports-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_id": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-operator-bundle\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_id": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-rhel8-operator\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_id": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "product_identification_helper": { "purl": "pkg:oci/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/cryostat-storage-rhel8\u0026tag=3.0.1-5" } } }, { "category": "product_version", "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_id": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "product_identification_helper": { "purl": "pkg:oci/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865?arch=amd64\u0026repository_url=registry.redhat.io/cryostat-tech-preview/jfr-datasource-rhel8\u0026tag=3.0.1-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64" }, "product_reference": "cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "relates_to_product_reference": "8Base-Cryostat-3" }, { "category": "default_component_of", "full_product_name": { "name": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64 as a component of Cryostat 3 on RHEL 8", "product_id": "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" }, "product_reference": "cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64", "relates_to_product_reference": "8Base-Cryostat-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34155", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:06.929766+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310527" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34155" }, { "category": "external", "summary": "RHBZ#2310527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34155" }, { "category": "external", "summary": "https://go.dev/cl/611238", "url": "https://go.dev/cl/611238" }, { "category": "external", "summary": "https://go.dev/issue/69138", "url": "https://go.dev/issue/69138" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3105", "url": "https://pkg.go.dev/vuln/GO-2024-3105" } ], "release_date": "2024-09-06T21:15:11.947000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion" }, { "cve": "CVE-2024-34156", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:09.377905+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310528" } ], "notes": [ { "category": "description", "text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", "title": "Vulnerability description" }, { "category": "summary", "text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34156" }, { "category": "external", "summary": "RHBZ#2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156" }, { "category": "external", "summary": "https://go.dev/cl/611239", "url": "https://go.dev/cl/611239" }, { "category": "external", "summary": "https://go.dev/issue/69139", "url": "https://go.dev/issue/69139" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3106", "url": "https://pkg.go.dev/vuln/GO-2024-3106" } ], "release_date": "2024-09-06T21:15:12.020000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-34158", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2024-09-06T21:20:12.126400+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310529" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34158" }, { "category": "external", "summary": "RHBZ#2310529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310529" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34158" }, { "category": "external", "summary": "https://go.dev/cl/611240", "url": "https://go.dev/cl/611240" }, { "category": "external", "summary": "https://go.dev/issue/69141", "url": "https://go.dev/issue/69141" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3107", "url": "https://pkg.go.dev/vuln/GO-2024-3107" } ], "release_date": "2024-09-06T21:15:12.083000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go/build/constraint: golang: Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T15:40:25+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:024661d83d12becbf66ea170dae5ec0f61447912edb04195580731ef342dbd29_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-db-rhel8@sha256:27642ac1b50de6deb1c40b9d0b39833b8ec7b36983872ebd10e0edc290967538_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:21a0f08768e4e19ce4f6d0c50f7afd8251308429a5770cff6dc6be3a878d2fb4_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-grafana-dashboard-rhel8@sha256:37e3e1d43ed523fa3fabcb1b5f7b6a3732a037e259e87e484a6ef567e2df82c3_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:37f122a3c9f96ab7aa9c4ad6e0e4beaa50411047b2fdbd7211b70d667b0cb0ca_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-operator-bundle@sha256:a932512a04c2ca801f1732342d4af6c3d70d0183effe6044e5a8737cf19e0dd0_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:679d6c647433974808d48f3ce76ce47921f5c6cd3119d953c853046e39545680_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8@sha256:bf93142d4955102b7255a2520d4866e85421f0a39ac93b24d36abff61f7d2a8c_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:7dec56889b09430f459f0de139e278c0b1724abef9eaea34934b737cd1deec80_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-reports-rhel8@sha256:eaf9db606e366ea748716ec7b0b8677a876f0fecbb448eaa333b989f52eb8bbb_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:8ebce6d1a55bec2854e1f7063fb971b9b76305060d325a83554aa75189257859_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8-operator@sha256:ceea652a2e315293571bdca6d4862b02f3d879b49b1c2e1488ec3938a4573c75_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:7ae4c5c565a87d90a7cc5f1e5015de2e69ff392c85efb3bd7d0c230b4dea1b32_amd64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-rhel8@sha256:9dc761a6fa1853f89444062bc5fe5cb372552ee6f10c4c74af6a5939c9394e4b_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:59d1ed4ceb69888c67b612bcd5bea3c1c2174118c49d0b42fc463e4790c5b849_arm64", "8Base-Cryostat-3:cryostat-tech-preview/cryostat-storage-rhel8@sha256:eb689a788e15b45fe72f7fbd910611eeb86629e48aedb9fe5b50e8519523cfee_amd64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:fc6cd0267a89c5fe4e0f7e4a09d566ce34768ef8e2b0b48c6fd69d318a84d425_arm64", "8Base-Cryostat-3:cryostat-tech-preview/jfr-datasource-rhel8@sha256:ffa084d43873b7a87d3c6685399f196f019a34503e0bda071e2a4278197c1865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" } ] }
rhsa-2024_7670
Vulnerability from csaf_redhat
Published
2024-10-10 11:49
Modified
2025-03-28 11:00
Summary
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
Notes
Topic
An update is now available for Red Hat build of Quarkus.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.
Details
This release of Red Hat build of Quarkus 3.8.6.SP1 contains security updates. For more information, see the release notes
page listed in the References section.
Security Fix(es):
* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)
* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)
* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)
* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Quarkus. \nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability. For\nmore information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Quarkus 3.8.6.SP1 contains security updates. For more information, see the release notes\npage listed in the References section.\n\nSecurity Fix(es):\n\n* com.google.protobuf/protobuf: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* org.eclipse.angus/angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication (CVE-2021-44549)\n\n* com.graphql-java.graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java (CVE-2024-40094)\n\n* org.apache.avro/avro: Schema parsing may trigger Remote Code Execution (RCE) (CVE-2024-47561)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7670", "url": "https://access.redhat.com/errata/RHSA-2024:7670" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_build_of_quarkus/3.8", "url": "https://docs.redhat.com/en/documentation/red_hat_build_of_quarkus/3.8" }, { "category": "external", "summary": "https://access.redhat.com/articles/4966181", "url": "https://access.redhat.com/articles/4966181" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7670.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update", "tracking": { "current_release_date": "2025-03-28T11:00:39+00:00", "generator": { "date": "2025-03-28T11:00:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2024:7670", "initial_release_date": "2024-10-10T11:49:18+00:00", "revision_history": [ { "date": "2024-10-10T11:49:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-10T11:49:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-28T11:00:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Quarkus 3.8", "product": { "name": "Red Hat build of Quarkus 3.8", "product_id": "Red Hat build of Quarkus 3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:quarkus:3.8::el8" } } } ], "category": "product_family", "name": "Red Hat build of Quarkus" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44549", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2024-10-01T01:34:34.576000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2315808" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Sling Commons Messaging Mail(angus-mail), which provides a simple interface for sending emails via SMTPS in OSGi, does not offer an option to enable server identity checks, leaving connections vulnerable to \"man-in-the-middle\" attacks and can allow insecure email communication.", "title": "Vulnerability description" }, { "category": "summary", "text": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability should be considered of important severity rather than moderate because it directly impacts the integrity and confidentiality of email communications over SMTPS. By disabling server identity checks, it leaves the communication channel vulnerable to \"man-in-the-middle\" (MITM) attacks, where an attacker could intercept, alter, or eavesdrop on email traffic by impersonating the legitimate mail server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44549" }, { "category": "external", "summary": "RHBZ#2315808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44549", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44549" } ], "release_date": "2023-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T11:49:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7670" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T11:49:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7670" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Quarkus 3.8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-40094", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-07-30T07:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301456" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in GraphQL Java, affecting versions prior to 21.5. This flaw allows an attacker to perform a denial of service (DoS) attack via introspection queries. The issue arises due to the improper handling of ExecutableNormalizedFields (ENFs), which are not adequately considered during the introspection query process. This issue could lead to resource exhaustion and service disruption under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40094" }, { "category": "external", "summary": "RHBZ#2301456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/discussions/3641", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/pull/3539", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "category": "external", "summary": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T11:49:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7670" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Quarkus 3.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-10T11:49:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Quarkus 3.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7670" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "Red Hat build of Quarkus 3.8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat build of Quarkus 3.8" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
ghsa-h9mq-f6q5-6c8m
Vulnerability from github
Published
2024-07-30 09:31
Modified
2024-07-30 15:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service
Details
GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "19.11" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "20.0" }, { "fixed": "20.9" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "com.graphql-java:graphql-java" }, "ranges": [ { "events": [ { "introduced": "21.0" }, { "fixed": "21.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-40094" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2024-07-30T15:08:48Z", "nvd_published_at": "2024-07-30T07:15:01Z", "severity": "HIGH" }, "details": "GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.", "id": "GHSA-h9mq-f6q5-6c8m", "modified": "2024-07-30T15:08:48Z", "published": "2024-07-30T09:31:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40094" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/pull/3539" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/16c159111507ef04d7e1839b2c23281d90c42b2b" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/469caf6ee600ab6709ad5e8a06f371fe2ef3b8dd" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/97743bc1b5caa2b0bd894dc8e128b47e4d771e4a" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/commit/fc6f304e66cab18b6d06a80c7009524938939a03" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/discussions/3641" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v19.11" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v20.9" }, { "type": "WEB", "url": "https://github.com/graphql-java/graphql-java/releases/tag/v21.5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "GraphQL Java does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.