Skip to content

Commit be1e5f5

Browse files
authored
Update CVE content for release-1.3 (#909)
Signed-off-by: Fabrice Flore-Thébault <[email protected]>
1 parent 9b39deb commit be1e5f5

File tree

3 files changed

+25
-21
lines changed

3 files changed

+25
-21
lines changed
Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
= {product} dependency updates
22

3+
link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]::
4+
A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program.
5+
36
link:https://access.redhat.com/security/cve/CVE-2024-24790[CVE-2024-24790]::
47
A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn't behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.
58

69
link:https://access.redhat.com/security/cve/CVE-2024-24791[CVE-2024-24791]::
710
A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.
811

9-
link:https://access.redhat.com/security/cve/CVE-2024-35255[CVE-2024-35255]::
10-
A flaw was found in the Azure identity library at github.com/Azure/azure-sdk-for-go/sdk/azidentity. This issue allows an elevation of privileges.
11-
1212
link:https://access.redhat.com/security/cve/CVE-2024-37891[CVE-2024-37891]::
1313
A flaw was found in urllib3, an HTTP client library for Python. In certain configurations, urllib3 does not treat the `Proxy-Authorization` HTTP header as one carrying authentication material. This issue results in not stripping the header on cross-origin redirects.
1414

@@ -17,3 +17,15 @@ A flaw was found in the fast-loops Node.js package. This flaw allows an attacker
1717

1818
link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]::
1919
A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input.
20+
21+
link:https://access.redhat.com/security/cve/CVE-2024-41818[CVE-2024-41818]::
22+
A regular expression denial of service (ReDoS) flaw was found in fast-xml-parser in the currency.js script. By sending a specially crafted regex input, a remote attacker could cause a denial of service condition.
23+
24+
link:https://access.redhat.com/security/cve/CVE-2024-43788[CVE-2024-43788]::
25+
A DOM Clobbering vulnerability was found in Webpack via `AutoPublicPathRuntimeModule`. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script through seemingly benign HTML markups in the webpage, for example, through a post or comment, and leverages the gadgets (pieces of JS code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to Cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or ID attributes.
26+
27+
link:https://access.redhat.com/security/cve/CVE-2024-43799[CVE-2024-43799]::
28+
A flaw was found in the Send library. This vulnerability allows remote code execution via untrusted input passed to the SendStream.redirect() function.
29+
30+
link:https://access.redhat.com/security/cve/CVE-2024-43800[CVE-2024-43800]::
31+
A flaw was found in serve-static. This issue may allow the execution of untrusted code via passing sanitized yet untrusted user input to redirect().

modules/release-notes/snip-fixed-security-issues-in-rpm-1.3.0.adoc

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,13 @@ link:https://access.redhat.com/security/cve/CVE-2024-26739[CVE-2024-26739]::
1414
A use-after-free flaw was found in net/sched/act_mirred.c in the Linux kernel. This may result in a crash.
1515

1616
link:https://access.redhat.com/security/cve/CVE-2024-26929[CVE-2024-26929]::
17-
In the Linux kernel, the following vulnerability has been resolved:
18-
scsi: qla2xxx: Fix double free of fcport
17+
A flaw was found in the qla2xxx module in the Linux kernel. Under some conditions, the fcport can be freed twice due to a missing check of whether fcport is allocated, causing a double free and a system crash, resulting in a denial of service.
1918

2019
link:https://access.redhat.com/security/cve/CVE-2024-26930[CVE-2024-26930]::
2120
A vulnerability was found in the Linux kernel. A potential double-free in the pointer ha->vp_map exists in the Linux kernel in drivers/scsi/qla2xxx/qla_os.c.
2221

2322
link:https://access.redhat.com/security/cve/CVE-2024-26931[CVE-2024-26931]::
24-
In the Linux kernel, the following vulnerability has been resolved:
25-
scsi: qla2xxx: Fix command flush on cable pull
23+
A flaw was found in the qla2xxx module in the Linux kernel. A NULL pointer dereference can be triggered when the system is under memory stress and the driver cannot allocate memory to handle the error recovery of cable pull, causing a system crash and a denial of service.
2624

2725
link:https://access.redhat.com/security/cve/CVE-2024-26947[CVE-2024-26947]::
2826
A flaw was found in the Linux kernel’s ARM memory management functionality, where certain memory layouts cause a kernel panic. This flaw allows an attacker who can specify or alter memory layouts to cause a denial of service.
@@ -31,16 +29,14 @@ link:https://access.redhat.com/security/cve/CVE-2024-26991[CVE-2024-26991]::
3129
A flaw was found in the Linux Kernel. A lpage_info overflow can occur when checking attributes. This may lead to a crash.
3230

3331
link:https://access.redhat.com/security/cve/CVE-2024-27022[CVE-2024-27022]::
34-
In the Linux kernel, the following vulnerability has been resolved:
35-
fork: defer linking file vma until vma is fully initialized
32+
A flaw was found in the Linux kernel. A race condition can occur when the fork system call is called due to improper locking, triggering a warning, impacting system stability, and resulting in a denial of service.
3633

3734
link:https://access.redhat.com/security/cve/CVE-2024-35895[CVE-2024-35895]::
38-
In the Linux kernel, the following vulnerability has been resolved:
39-
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
35+
CVE-2024-35895 addresses a vulnerability in the Linux kernel's Berkeley Packet Filter (BPF) subsystem, specifically within the sockmap feature. The issue arises when BPF tracing programs, which can execute in various interrupt contexts, attempt to delete elements from sockmap or sockhash maps. This operation involves acquiring locks that are not safe for use in hard interrupt contexts, leading to potential deadlocks due to lock inversion.
36+
BPF tracing programs may delete elements from sockmap/sockhash maps while running in interrupt contexts where the required locks are not hardirq-safe, causing possible deadlocks.
4037

4138
link:https://access.redhat.com/security/cve/CVE-2024-36016[CVE-2024-36016]::
42-
In the Linux kernel, the following vulnerability has been resolved:
43-
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
39+
A vulnerability was found in the Linux kernel's `n_gsm` driver, affecting the `tty` subsystem. It occurs when switching between basic and advanced option modes in GSM multiplexing, leading to potential out-of-bounds memory writes. This happens because certain state variables, like `gsm->len` and `gsm->state`, are not properly reset during mode changes. The issue could result in memory corruption.
4440

4541
link:https://access.redhat.com/security/cve/CVE-2024-36899[CVE-2024-36899]::
4642
In the Linux kernel, the following vulnerability has been resolved:

modules/release-notes/snip-fixed-security-issues-in-rpm-1.3.1.adoc

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,7 @@ link:https://access.redhat.com/security/cve/CVE-2023-28746[CVE-2023-28746]::
88
A vulnerability was found in some Intel Atom Processor's microcode. This issue may allow a malicious actor to achieve a local information disclosure, impacting the data confidentiality of the targeted system.
99

1010
link:https://access.redhat.com/security/cve/CVE-2023-52658[CVE-2023-52658]::
11-
In the Linux kernel, the following vulnerability has been resolved:
12-
Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
11+
CVE-2023-52658 is a vulnerability in the Linux kernel's Mellanox MLX5 driver, specifically related to the switchdev mode. A previous commit intended to block entering switchdev mode due to namespace inconsistencies inadvertently caused system crashes. To address this, the problematic commit was reverted, restoring stability. Users should update their Linux kernel to a version that includes this reversion to ensure reliable operation.
1312

1413
link:https://access.redhat.com/security/cve/CVE-2024-6232[CVE-2024-6232]::
1514
A regular expression denial of service (ReDos) vulnerability was found in Python's tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.
@@ -25,16 +24,14 @@ link:https://access.redhat.com/security/cve/CVE-2024-34156[CVE-2024-34156]::
2524
A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
2625

2726
link:https://access.redhat.com/security/cve/CVE-2024-35989[CVE-2024-35989]::
28-
In the Linux kernel, the following vulnerability has been resolved:
29-
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
27+
This is a vulnerability in the Linux kernel's Data Movement Accelerator (DMA) engine, specifically affecting the Intel Data Streaming Accelerator (IDXD) driver. The issue arises during the removal (rmmod) of the idxd driver on systems with only one active CPU. In such scenarios, the driver's cleanup process attempts to migrate performance monitoring unit (PMU) contexts to another CPU. However, with no other CPUs available, this leads to a kernel oops—a serious error causing the system to crash.
3028

3129
link:https://access.redhat.com/security/cve/CVE-2024-36889[CVE-2024-36889]::
3230
In the Linux kernel, the following vulnerability has been resolved:
3331
mptcp: ensure snd_nxt is properly initialized on connect
3432

3533
link:https://access.redhat.com/security/cve/CVE-2024-36978[CVE-2024-36978]::
36-
In the Linux kernel, the following vulnerability has been resolved:
37-
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
34+
An out-of-bounds write flaw was found in the Linux kernel's multiq qdisc functionality. This vulnerability allows a local user to crash or potentially escalate their privileges on the system.
3835

3936
link:https://access.redhat.com/security/cve/CVE-2024-38556[CVE-2024-38556]::
4037
In the Linux kernel, the following vulnerability has been resolved:
@@ -61,5 +58,4 @@ In the Linux kernel, the following vulnerability has been resolved:
6158
sched: act_ct: take care of padding in struct zones_ht_key
6259

6360
link:https://access.redhat.com/security/cve/CVE-2024-42284[CVE-2024-42284]::
64-
In the Linux kernel, the following vulnerability has been resolved:
65-
tipc: Return non-zero value from tipc_udp_addr2str() on error
61+
A flaw was found in Linux kernel tipc. tipc_udp_addr2str() does not return a nonzero value when UDP media address is invalid, which can result in a buffer overflow in tipc_media_addr_printf().

0 commit comments

Comments
 (0)