Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-48948 (GCVE-0-2024-48948)
Vulnerability from cvelistv5
Published
2024-10-15 00:00
Modified
2024-12-20 13:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
References
► | URL | Tags | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nodejs:elliptic:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "elliptic", "vendor": "nodejs", "versions": [ { "status": "affected", "version": "6.5.7" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-48948", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T13:57:37.235007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T18:36:35.085Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-12-20T13:06:45.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20241220-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T13:21:42.589249", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/indutny/elliptic/pull/322" }, { "url": "https://github.com/indutny/elliptic/issues/321" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-48948", "datePublished": "2024-10-15T00:00:00", "dateReserved": "2024-10-10T00:00:00", "dateUpdated": "2024-12-20T13:06:45.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-48948\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-10-15T14:15:05.280\",\"lastModified\":\"2025-06-20T16:18:20.107\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.\"},{\"lang\":\"es\",\"value\":\"El paquete Elliptic 6.5.7 para Node.js, en su implementaci\u00f3n para ECDSA, no verifica correctamente las firmas v\u00e1lidas si el hash contiene al menos cuatro bytes 0 iniciales y cuando el orden del punto base de la curva el\u00edptica es menor que el hash, debido a una anomal\u00eda _truncateToN. Esto hace que se rechacen firmas v\u00e1lidas. Las transacciones o comunicaciones leg\u00edtimas pueden marcarse incorrectamente como no v\u00e1lidas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:indutny:elliptic:6.5.7:*:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"DCF7D11D-DB43-448B-96E4-8A5C2CAA8912\"}]}]}],\"references\":[{\"url\":\"https://github.com/indutny/elliptic/issues/321\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://github.com/indutny/elliptic/pull/322\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241220-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20241220-0004/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-12-20T13:06:45.340Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-48948\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T13:57:37.235007Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:nodejs:elliptic:*:*:*:*:*:*:*:*\"], \"vendor\": \"nodejs\", \"product\": \"elliptic\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5.7\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"CWE-347 Improper Verification of Cryptographic Signature\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-05T18:36:28.677Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/indutny/elliptic/pull/322\"}, {\"url\": \"https://github.com/indutny/elliptic/issues/321\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-10-15T13:21:42.589249\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-48948\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-20T13:06:45.340Z\", \"dateReserved\": \"2024-10-10T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-10-15T00:00:00\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-3285
Vulnerability from csaf_certbund
Published
2024-10-27 23:00
Modified
2025-03-02 23:00
Summary
IBM App Connect Enterprise: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM App Connect Enterprise kombiniert die branchenbew\u00e4hrten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3285 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3285.json" }, { "category": "self", "summary": "WID-SEC-2024-3285 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3285" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-10-27", "url": "https://www.ibm.com/support/pages/node/7174116" }, { "category": "external", "summary": "IBM Security Bulletin 7184429 vom 2025-03-02", "url": "https://www.ibm.com/support/pages/node/7184429" }, { "category": "external", "summary": "IBM Security Bulletin 7184430 vom 2025-03-02", "url": "https://www.ibm.com/support/pages/node/7184430" } ], "source_lang": "en-US", "title": "IBM App Connect Enterprise: Mehrere Schwachstellen erm\u00f6glichen Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2025-03-02T23:00:00.000+00:00", "generator": { "date": "2025-03-03T11:44:19.323+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-3285", "initial_release_date": "2024-10-27T23:00:00.000+00:00", "revision_history": [ { "date": "2024-10-27T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Certified Container \u003c11.6.0", "product": { "name": "IBM App Connect Enterprise Certified Container \u003c11.6.0", "product_id": "T038623" } }, { "category": "product_version", "name": "Certified Container 11.6.0", "product": { "name": "IBM App Connect Enterprise Certified Container 11.6.0", "product_id": "T038623-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container__11.6.0" } } }, { "category": "product_version_range", "name": "Certified Container \u003c12.0", "product": { "name": "IBM App Connect Enterprise Certified Container \u003c12.0", "product_id": "T038624" } }, { "category": "product_version", "name": "Certified Container 12.0", "product": { "name": "IBM App Connect Enterprise Certified Container 12.0", "product_id": "T038624-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container__12.0" } } }, { "category": "product_version", "name": "mobile(android)", "product": { "name": "IBM App Connect Enterprise mobile(android)", "product_id": "T041496", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:mobile%28android%29" } } } ], "category": "product_name", "name": "App Connect Enterprise" }, { "branches": [ { "category": "product_version", "name": "mobile(iOS)", "product": { "name": "IBM Cognos Analytics mobile(iOS)", "product_id": "T041495", "product_identification_helper": { "cpe": "cpe:/a:ibm:cognos_analytics:mobile%28ios%29" } } } ], "category": "product_name", "name": "Cognos Analytics" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-48948", "product_status": { "known_affected": [ "T041495", "T038624", "T038623", "T041496" ] }, "release_date": "2024-10-27T23:00:00.000+00:00", "title": "CVE-2024-48948" }, { "cve": "CVE-2024-48949", "product_status": { "known_affected": [ "T041495", "T038624", "T038623", "T041496" ] }, "release_date": "2024-10-27T23:00:00.000+00:00", "title": "CVE-2024-48949" } ] }
wid-sec-w-2025-0043
Vulnerability from csaf_certbund
Published
2025-01-12 23:00
Modified
2025-03-17 23:00
Summary
IBM QRadar SIEM (Log Source Management App): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu erzeugen, Daten zu manipulieren, vertrauliche Informationen offenzulegen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, Daten zu manipulieren, vertrauliche Informationen offenzulegen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0043 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0043.json" }, { "category": "self", "summary": "WID-SEC-2025-0043 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0043" }, { "category": "external", "summary": "IBM Security Bulletin vom 2025-01-12", "url": "https://www.ibm.com/support/pages/node/7180725" }, { "category": "external", "summary": "IBM Security Bulletin 7181570 vom 2025-01-24", "url": "https://www.ibm.com/support/pages/node/7181570" }, { "category": "external", "summary": "IBM Security Bulletin 7181915 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181915" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0892 vom 2025-02-03", "url": "https://access.redhat.com/errata/RHSA-2025:0892" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1051 vom 2025-02-05", "url": "https://access.redhat.com/errata/RHSA-2025:1051" }, { "category": "external", "summary": "IBM Security Bulletin 7184092 vom 2025-02-25", "url": "https://www.ibm.com/support/pages/node/7184092" }, { "category": "external", "summary": "IBM Security Bulletin 7184955 vom 2025-03-06", "url": "https://www.ibm.com/support/pages/node/7184955" }, { "category": "external", "summary": "IBM Security Bulletin 7186423 vom 2025-03-17", "url": "https://www.ibm.com/support/pages/node/7186423" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM (Log Source Management App): Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-03-17T23:00:00.000+00:00", "generator": { "date": "2025-03-18T09:12:53.448+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0043", "initial_release_date": "2025-01-12T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-12T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-02T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-04T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "7", "summary": "Produktzuordnung korrigiert" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM App Connect Enterprise", "product": { "name": "IBM App Connect Enterprise", "product_id": "T032495", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:-" } } }, { "category": "product_version_range", "name": "\u003c13.0.2.1", "product": { "name": "IBM App Connect Enterprise \u003c13.0.2.1", "product_id": "T040605" } }, { "category": "product_version", "name": "13.0.2.1", "product": { "name": "IBM App Connect Enterprise 13.0.2.1", "product_id": "T040605-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:13.0.2.1" } } }, { "category": "product_version_range", "name": "\u003c12.0.12.10", "product": { "name": "IBM App Connect Enterprise \u003c12.0.12.10", "product_id": "T040606" } }, { "category": "product_version", "name": "12.0.12.10", "product": { "name": "IBM App Connect Enterprise 12.0.12.10", "product_id": "T040606-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.12.10" } } } ], "category": "product_name", "name": "App Connect Enterprise" }, { "branches": [ { "category": "product_version_range", "name": "Log Source Management App \u003c7.0.11", "product": { "name": "IBM QRadar SIEM Log Source Management App \u003c7.0.11", "product_id": "T040117" } }, { "category": "product_version", "name": "Log Source Management App 7.0.11", "product": { "name": "IBM QRadar SIEM Log Source Management App 7.0.11", "product_id": "T040117-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:log_source_management_app__7.0.11" } } }, { "category": "product_version", "name": "7.5.0", "product": { "name": "IBM QRadar SIEM 7.5.0", "product_id": "T041207", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0" } } }, { "category": "product_version_range", "name": "Data Synchronization App \u003c3.2.1", "product": { "name": "IBM QRadar SIEM Data Synchronization App \u003c3.2.1", "product_id": "T041488" } }, { "category": "product_version", "name": "Data Synchronization App 3.2.1", "product": { "name": "IBM QRadar SIEM Data Synchronization App 3.2.1", "product_id": "T041488-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:data_synchronization_app__3.2.1" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-43788", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43788" }, { "cve": "CVE-2024-43796", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43796" }, { "cve": "CVE-2024-43799", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43799" }, { "cve": "CVE-2024-43800", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43800" }, { "cve": "CVE-2024-47068", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47068" }, { "cve": "CVE-2024-47875", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47875" }, { "cve": "CVE-2024-21536", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-21536" }, { "cve": "CVE-2024-21538", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-21538" }, { "cve": "CVE-2024-33883", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-33883" }, { "cve": "CVE-2024-37890", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-37890" }, { "cve": "CVE-2024-4067", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-4067" }, { "cve": "CVE-2024-4068", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-4068" }, { "cve": "CVE-2024-45296", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-45296" }, { "cve": "CVE-2024-45590", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-45590" }, { "cve": "CVE-2024-48948", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48948" }, { "cve": "CVE-2024-48949", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48949" }, { "cve": "CVE-2024-52798", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-52798" }, { "cve": "CVE-2024-55565", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55565" }, { "cve": "CVE-2024-45801", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-45801" }, { "cve": "CVE-2024-42459", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-42459" }, { "cve": "CVE-2024-42460", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-42460" }, { "cve": "CVE-2024-42461", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-42461" }, { "cve": "CVE-2024-47764", "product_status": { "known_affected": [ "T040606", "T040605", "67646", "T041207", "T040117", "T041488", "T032495" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47764" } ] }
suse-su-2024:3771-1
Vulnerability from csaf_suse
Published
2024-10-29 12:55
Modified
2024-10-29 12:55
Summary
Security update for pgadmin4
Notes
Title of the patch
Security update for pgadmin4
Description of the patch
This update for pgadmin4 fixes the following issues:
- CVE-2024-38355: Fixed socket.io: unhandled 'error' event (bsc#1226967)
- CVE-2024-38998: Fixed requirejs: prototype pollution via function config (bsc#1227248)
- CVE-2024-38999: Fixed requirejs: prototype pollution via function s.contexts._.configure (bsc#1227252)
- CVE-2024-39338: Fixed axios: server-side request forgery due to requests for path relative URLs being processed as protocol relative URLs in axios (bsc#1229423)
- CVE-2024-4067: Fixed micromatch: vulnerable to Regular Expression Denial of Service (ReDoS) (bsc#1224366)
- CVE-2024-4068: Fixed braces: fails to limit the number of characters it can handle, which could lead to Memory Exhaustion (bsc#1224295)
- CVE-2024-43788: Fixed webpack: DOM clobbering gadget in AutoPublicPathRuntimeModule could lead to XSS (bsc#1229861)
- CVE-2024-48948: Fixed elliptic: ECDSA signature verification error due to leading zero may reject legitimate transactions in elliptic (bsc#1231684)
- CVE-2024-48949: Fixed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification (bsc#1231564)
- CVE-2024-9014: Fixed OAuth2 issue that could lead to information leak (bsc#1230928)
Patchnames
SUSE-2024-3771,SUSE-SLE-Module-Python3-15-SP6-2024-3771,openSUSE-SLE-15.6-2024-3771
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pgadmin4", "title": "Title of the patch" }, { "category": "description", "text": "This update for pgadmin4 fixes the following issues:\n\n- CVE-2024-38355: Fixed socket.io: unhandled \u0027error\u0027 event (bsc#1226967)\n- CVE-2024-38998: Fixed requirejs: prototype pollution via function config (bsc#1227248)\n- CVE-2024-38999: Fixed requirejs: prototype pollution via function s.contexts._.configure (bsc#1227252)\n- CVE-2024-39338: Fixed axios: server-side request forgery due to requests for path relative URLs being processed as protocol relative URLs in axios (bsc#1229423)\n- CVE-2024-4067: Fixed micromatch: vulnerable to Regular Expression Denial of Service (ReDoS) (bsc#1224366)\n- CVE-2024-4068: Fixed braces: fails to limit the number of characters it can handle, which could lead to Memory Exhaustion (bsc#1224295)\n- CVE-2024-43788: Fixed webpack: DOM clobbering gadget in AutoPublicPathRuntimeModule could lead to XSS (bsc#1229861)\n- CVE-2024-48948: Fixed elliptic: ECDSA signature verification error due to leading zero may reject legitimate transactions in elliptic (bsc#1231684)\n- CVE-2024-48949: Fixed elliptic: Missing Validation in Elliptic\u0027s EDDSA Signature Verification (bsc#1231564)\n- CVE-2024-9014: Fixed OAuth2 issue that could lead to information leak (bsc#1230928)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3771,SUSE-SLE-Module-Python3-15-SP6-2024-3771,openSUSE-SLE-15.6-2024-3771", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3771-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3771-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3771-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" }, { "category": "self", "summary": "SUSE Bug 1224295", "url": "https://bugzilla.suse.com/1224295" }, { "category": "self", "summary": "SUSE Bug 1224366", "url": "https://bugzilla.suse.com/1224366" }, { "category": "self", "summary": "SUSE Bug 1226967", "url": "https://bugzilla.suse.com/1226967" }, { "category": "self", "summary": "SUSE Bug 1227248", "url": "https://bugzilla.suse.com/1227248" }, { "category": "self", "summary": "SUSE Bug 1227252", "url": "https://bugzilla.suse.com/1227252" }, { "category": "self", "summary": "SUSE Bug 1229423", "url": "https://bugzilla.suse.com/1229423" }, { "category": "self", "summary": "SUSE Bug 1229861", "url": "https://bugzilla.suse.com/1229861" }, { "category": "self", "summary": "SUSE Bug 1230928", "url": "https://bugzilla.suse.com/1230928" }, { "category": "self", "summary": "SUSE Bug 1231564", "url": "https://bugzilla.suse.com/1231564" }, { "category": "self", "summary": "SUSE Bug 1231684", "url": "https://bugzilla.suse.com/1231684" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38355 page", "url": "https://www.suse.com/security/cve/CVE-2024-38355/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38998 page", "url": "https://www.suse.com/security/cve/CVE-2024-38998/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38999 page", "url": "https://www.suse.com/security/cve/CVE-2024-38999/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-39338 page", "url": "https://www.suse.com/security/cve/CVE-2024-39338/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4067 page", "url": "https://www.suse.com/security/cve/CVE-2024-4067/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4068 page", "url": "https://www.suse.com/security/cve/CVE-2024-4068/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-43788 page", "url": "https://www.suse.com/security/cve/CVE-2024-43788/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48948 page", "url": "https://www.suse.com/security/cve/CVE-2024-48948/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48949 page", "url": "https://www.suse.com/security/cve/CVE-2024-48949/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-9014 page", "url": "https://www.suse.com/security/cve/CVE-2024-9014/" } ], "title": "Security update for pgadmin4", "tracking": { "current_release_date": "2024-10-29T12:55:34Z", "generator": { "date": "2024-10-29T12:55:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3771-1", "initial_release_date": "2024-10-29T12:55:34Z", "revision_history": [ { "date": "2024-10-29T12:55:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pgadmin4-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-cloud-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-desktop-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-doc-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "product": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "product_id": "system-user-pgadmin-8.5-150600.3.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-python3:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch" }, "product_reference": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" }, "product_reference": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38355" } ], "notes": [ { "category": "general", "text": "Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `socket.io@4.6.2` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the \"error\" event to catch these errors.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38355", "url": "https://www.suse.com/security/cve/CVE-2024-38355" }, { "category": "external", "summary": "SUSE Bug 1226965 for CVE-2024-38355", "url": "https://bugzilla.suse.com/1226965" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38355" }, { "cve": "CVE-2024-38998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38998" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38998", "url": "https://www.suse.com/security/cve/CVE-2024-38998" }, { "category": "external", "summary": "SUSE Bug 1227247 for CVE-2024-38998", "url": "https://bugzilla.suse.com/1227247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38999" } ], "notes": [ { "category": "general", "text": "jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function s.contexts._.configure. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38999", "url": "https://www.suse.com/security/cve/CVE-2024-38999" }, { "category": "external", "summary": "SUSE Bug 1227251 for CVE-2024-38999", "url": "https://bugzilla.suse.com/1227251" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-39338" } ], "notes": [ { "category": "general", "text": "axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-39338", "url": "https://www.suse.com/security/cve/CVE-2024-39338" }, { "category": "external", "summary": "SUSE Bug 1229421 for CVE-2024-39338", "url": "https://bugzilla.suse.com/1229421" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-39338" }, { "cve": "CVE-2024-4067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4067" } ], "notes": [ { "category": "general", "text": "The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn\u0027t find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won\u0027t start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4067", "url": "https://www.suse.com/security/cve/CVE-2024-4067" }, { "category": "external", "summary": "SUSE Bug 1224255 for CVE-2024-4067", "url": "https://bugzilla.suse.com/1224255" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-4067" }, { "cve": "CVE-2024-4068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4068" } ], "notes": [ { "category": "general", "text": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4068", "url": "https://www.suse.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "SUSE Bug 1224256 for CVE-2024-4068", "url": "https://bugzilla.suse.com/1224256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-4068" }, { "cve": "CVE-2024-43788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-43788" } ], "notes": [ { "category": "general", "text": "Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack\u0027s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-43788", "url": "https://www.suse.com/security/cve/CVE-2024-43788" }, { "category": "external", "summary": "SUSE Bug 1229860 for CVE-2024-43788", "url": "https://bugzilla.suse.com/1229860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "moderate" } ], "title": "CVE-2024-43788" }, { "cve": "CVE-2024-48948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48948" } ], "notes": [ { "category": "general", "text": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48948", "url": "https://www.suse.com/security/cve/CVE-2024-48948" }, { "category": "external", "summary": "SUSE Bug 1231681 for CVE-2024-48948", "url": "https://bugzilla.suse.com/1231681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "moderate" } ], "title": "CVE-2024-48948" }, { "cve": "CVE-2024-48949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48949" } ], "notes": [ { "category": "general", "text": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48949", "url": "https://www.suse.com/security/cve/CVE-2024-48949" }, { "category": "external", "summary": "SUSE Bug 1231557 for CVE-2024-48949", "url": "https://bugzilla.suse.com/1231557" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-48949" }, { "cve": "CVE-2024-9014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-9014" } ], "notes": [ { "category": "general", "text": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-9014", "url": "https://www.suse.com/security/cve/CVE-2024-9014" }, { "category": "external", "summary": "SUSE Bug 1230928 for CVE-2024-9014", "url": "https://bugzilla.suse.com/1230928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-9014" } ] }
opensuse-su-2025:14663-1
Vulnerability from csaf_opensuse
Published
2025-01-17 00:00
Modified
2025-01-17 00:00
Summary
velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media
Notes
Title of the patch
velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media
Description of the patch
These are all security issues fixed in the velociraptor-0.7.0.4.git142.862ef23-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14663
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the velociraptor-0.7.0.4.git142.862ef23-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14663", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14663-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14663-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14663-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1732 page", "url": "https://www.suse.com/security/cve/CVE-2023-1732/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-44270 page", "url": "https://www.suse.com/security/cve/CVE-2023-44270/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-45133 page", "url": "https://www.suse.com/security/cve/CVE-2023-45133/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-45683 page", "url": "https://www.suse.com/security/cve/CVE-2023-45683/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46234 page", "url": "https://www.suse.com/security/cve/CVE-2023-46234/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21538 page", "url": "https://www.suse.com/security/cve/CVE-2024-21538/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23331 page", "url": "https://www.suse.com/security/cve/CVE-2024-23331/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24786 page", "url": "https://www.suse.com/security/cve/CVE-2024-24786/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-28180 page", "url": "https://www.suse.com/security/cve/CVE-2024-28180/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31207 page", "url": "https://www.suse.com/security/cve/CVE-2024-31207/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-37298 page", "url": "https://www.suse.com/security/cve/CVE-2024-37298/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4067 page", "url": "https://www.suse.com/security/cve/CVE-2024-4067/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4068 page", "url": "https://www.suse.com/security/cve/CVE-2024-4068/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-42459 page", "url": "https://www.suse.com/security/cve/CVE-2024-42459/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-42460 page", "url": "https://www.suse.com/security/cve/CVE-2024-42460/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-42461 page", "url": "https://www.suse.com/security/cve/CVE-2024-42461/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45296 page", "url": "https://www.suse.com/security/cve/CVE-2024-45296/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45338 page", "url": "https://www.suse.com/security/cve/CVE-2024-45338/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45811 page", "url": "https://www.suse.com/security/cve/CVE-2024-45811/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45812 page", "url": "https://www.suse.com/security/cve/CVE-2024-45812/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-47068 page", "url": "https://www.suse.com/security/cve/CVE-2024-47068/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-47875 page", "url": "https://www.suse.com/security/cve/CVE-2024-47875/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48948 page", "url": "https://www.suse.com/security/cve/CVE-2024-48948/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48949 page", "url": "https://www.suse.com/security/cve/CVE-2024-48949/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51744 page", "url": "https://www.suse.com/security/cve/CVE-2024-51744/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-55565 page", "url": "https://www.suse.com/security/cve/CVE-2024-55565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-6104 page", "url": "https://www.suse.com/security/cve/CVE-2024-6104/" } ], "title": "velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media", "tracking": { "current_release_date": "2025-01-17T00:00:00Z", "generator": { "date": "2025-01-17T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14663-1", "initial_release_date": "2025-01-17T00:00:00Z", "revision_history": [ { "date": "2025-01-17T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "product": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "product": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "product": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64", "product": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64", "product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64" }, "product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le" }, "product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x" }, "product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" }, "product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1732" } ], "notes": [ { "category": "general", "text": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1732", "url": "https://www.suse.com/security/cve/CVE-2023-1732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1732" }, { "cve": "CVE-2023-44270", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-44270" } ], "notes": [ { "category": "general", "text": "An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-44270", "url": "https://www.suse.com/security/cve/CVE-2023-44270" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-44270" }, { "cve": "CVE-2023-45133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-45133" } ], "notes": [ { "category": "general", "text": "Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any \"polyfill provider\" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/traverse@7.23.2` and `@babel/traverse@8.0.0-alpha.4`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-45133", "url": "https://www.suse.com/security/cve/CVE-2023-45133" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.3, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "critical" } ], "title": "CVE-2023-45133" }, { "cve": "CVE-2023-45683", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-45683" } ], "notes": [ { "category": "general", "text": "github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim\u0027s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-45683", "url": "https://www.suse.com/security/cve/CVE-2023-45683" }, { "category": "external", "summary": "SUSE Bug 1216308 for CVE-2023-45683", "url": "https://bugzilla.suse.com/1216308" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2023-45683" }, { "cve": "CVE-2023-46234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46234" } ], "notes": [ { "category": "general", "text": "browserify-sign is a package to duplicate the functionality of node\u0027s crypto public key functions, much of this is based on Fedor Indutny\u0027s work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46234", "url": "https://www.suse.com/security/cve/CVE-2023-46234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2023-46234" }, { "cve": "CVE-2024-21538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21538" } ], "notes": [ { "category": "general", "text": "Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21538", "url": "https://www.suse.com/security/cve/CVE-2024-21538" }, { "category": "external", "summary": "SUSE Bug 1233843 for CVE-2024-21538", "url": "https://bugzilla.suse.com/1233843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-21538" }, { "cve": "CVE-2024-23331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23331" } ], "notes": [ { "category": "general", "text": "Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn\u0027t discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23331", "url": "https://www.suse.com/security/cve/CVE-2024-23331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23331" }, { "cve": "CVE-2024-24786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24786" } ], "notes": [ { "category": "general", "text": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24786", "url": "https://www.suse.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "SUSE Bug 1226136 for CVE-2024-24786", "url": "https://bugzilla.suse.com/1226136" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-24786" }, { "cve": "CVE-2024-28180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-28180" } ], "notes": [ { "category": "general", "text": "Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-28180", "url": "https://www.suse.com/security/cve/CVE-2024-28180" }, { "category": "external", "summary": "SUSE Bug 1234984 for CVE-2024-28180", "url": "https://bugzilla.suse.com/1234984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-28180" }, { "cve": "CVE-2024-31207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31207" } ], "notes": [ { "category": "general", "text": "Vite (French word for \"quick\", pronounced /vit/, like \"veet\") is a frontend build tooling to improve the frontend development experience.`server.fs.deny` does not deny requests for patterns with directories. This vulnerability has been patched in version(s) 5.2.6, 5.1.7, 5.0.13, 4.5.3, 3.2.10 and 2.9.18.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31207", "url": "https://www.suse.com/security/cve/CVE-2024-31207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-31207" }, { "cve": "CVE-2024-37298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-37298" } ], "notes": [ { "category": "general", "text": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-37298", "url": "https://www.suse.com/security/cve/CVE-2024-37298" }, { "category": "external", "summary": "SUSE Bug 1227309 for CVE-2024-37298", "url": "https://bugzilla.suse.com/1227309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-37298" }, { "cve": "CVE-2024-4067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4067" } ], "notes": [ { "category": "general", "text": "The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn\u0027t find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won\u0027t start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4067", "url": "https://www.suse.com/security/cve/CVE-2024-4067" }, { "category": "external", "summary": "SUSE Bug 1224255 for CVE-2024-4067", "url": "https://bugzilla.suse.com/1224255" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-4067" }, { "cve": "CVE-2024-4068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4068" } ], "notes": [ { "category": "general", "text": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4068", "url": "https://www.suse.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "SUSE Bug 1224256 for CVE-2024-4068", "url": "https://bugzilla.suse.com/1224256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-4068" }, { "cve": "CVE-2024-42459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-42459" } ], "notes": [ { "category": "general", "text": "In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-42459", "url": "https://www.suse.com/security/cve/CVE-2024-42459" }, { "category": "external", "summary": "SUSE Bug 1232538 for CVE-2024-42459", "url": "https://bugzilla.suse.com/1232538" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-42459" }, { "cve": "CVE-2024-42460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-42460" } ], "notes": [ { "category": "general", "text": "In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-42460", "url": "https://www.suse.com/security/cve/CVE-2024-42460" }, { "category": "external", "summary": "SUSE Bug 1232538 for CVE-2024-42460", "url": "https://bugzilla.suse.com/1232538" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-42460" }, { "cve": "CVE-2024-42461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-42461" } ], "notes": [ { "category": "general", "text": "In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-42461", "url": "https://www.suse.com/security/cve/CVE-2024-42461" }, { "category": "external", "summary": "SUSE Bug 1232538 for CVE-2024-42461", "url": "https://bugzilla.suse.com/1232538" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-42461" }, { "cve": "CVE-2024-45296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45296" } ], "notes": [ { "category": "general", "text": "path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45296", "url": "https://www.suse.com/security/cve/CVE-2024-45296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-45296" }, { "cve": "CVE-2024-45338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45338" } ], "notes": [ { "category": "general", "text": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45338", "url": "https://www.suse.com/security/cve/CVE-2024-45338" }, { "category": "external", "summary": "SUSE Bug 1234794 for CVE-2024-45338", "url": "https://bugzilla.suse.com/1234794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45338" }, { "cve": "CVE-2024-45811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45811" } ], "notes": [ { "category": "general", "text": "Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import\u0026raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45811", "url": "https://www.suse.com/security/cve/CVE-2024-45811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45811" }, { "cve": "CVE-2024-45812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45812" } ], "notes": [ { "category": "general", "text": "Vite a frontend build tooling framework for javascript. Affected versions of vite were discovered to contain a DOM Clobbering vulnerability when building scripts to `cjs`/`iife`/`umd` output format. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. We have identified a DOM Clobbering vulnerability in Vite bundled scripts, particularly when the scripts dynamically import other scripts from the assets folder and the developer sets the build output format to `cjs`, `iife`, or `umd`. In such cases, Vite replaces relative paths starting with `__VITE_ASSET__` using the URL retrieved from `document.currentScript`. However, this implementation is vulnerable to a DOM Clobbering attack. The `document.currentScript` lookup can be shadowed by an attacker via the browser\u0027s named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server. This vulnerability can result in cross-site scripting (XSS) attacks on websites that include Vite-bundled files (configured with an output format of `cjs`, `iife`, or `umd`) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45812", "url": "https://www.suse.com/security/cve/CVE-2024-45812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45812" }, { "cve": "CVE-2024-47068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-47068" } ], "notes": [ { "category": "general", "text": "Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3.29.5, and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from `import.meta` (e.g., `import.meta.url`) in `cjs`/`umd`/`iife` format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Versions 2.79.2, 3.29.5, and 4.22.4 contain a patch for the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-47068", "url": "https://www.suse.com/security/cve/CVE-2024-47068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-47068" }, { "cve": "CVE-2024-47875", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-47875" } ], "notes": [ { "category": "general", "text": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-47875", "url": "https://www.suse.com/security/cve/CVE-2024-47875" }, { "category": "external", "summary": "SUSE Bug 1231571 for CVE-2024-47875", "url": "https://bugzilla.suse.com/1231571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-47875" }, { "cve": "CVE-2024-48948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48948" } ], "notes": [ { "category": "general", "text": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48948", "url": "https://www.suse.com/security/cve/CVE-2024-48948" }, { "category": "external", "summary": "SUSE Bug 1231681 for CVE-2024-48948", "url": "https://bugzilla.suse.com/1231681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-48948" }, { "cve": "CVE-2024-48949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48949" } ], "notes": [ { "category": "general", "text": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48949", "url": "https://www.suse.com/security/cve/CVE-2024-48949" }, { "category": "external", "summary": "SUSE Bug 1231557 for CVE-2024-48949", "url": "https://bugzilla.suse.com/1231557" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "important" } ], "title": "CVE-2024-48949" }, { "cve": "CVE-2024-51744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51744" } ], "notes": [ { "category": "general", "text": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51744", "url": "https://www.suse.com/security/cve/CVE-2024-51744" }, { "category": "external", "summary": "SUSE Bug 1232936 for CVE-2024-51744", "url": "https://bugzilla.suse.com/1232936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-51744" }, { "cve": "CVE-2024-55565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-55565" } ], "notes": [ { "category": "general", "text": "nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-55565", "url": "https://www.suse.com/security/cve/CVE-2024-55565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-55565" }, { "cve": "CVE-2024-6104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-6104" } ], "notes": [ { "category": "general", "text": "go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-6104", "url": "https://www.suse.com/security/cve/CVE-2024-6104" }, { "category": "external", "summary": "SUSE Bug 1227024 for CVE-2024-6104", "url": "https://bugzilla.suse.com/1227024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x", "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-6104" } ] }
opensuse-su-2024:14433-1
Vulnerability from csaf_opensuse
Published
2024-10-28 00:00
Modified
2024-10-28 00:00
Summary
python310-pytest-html-4.1.1-3.1 on GA media
Notes
Title of the patch
python310-pytest-html-4.1.1-3.1 on GA media
Description of the patch
These are all security issues fixed in the python310-pytest-html-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14433
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "python310-pytest-html-4.1.1-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the python310-pytest-html-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14433", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14433-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14433-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6T6CDEWWWFSFMQOVDGVJ3WQLF2J4E2J/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14433-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6T6CDEWWWFSFMQOVDGVJ3WQLF2J4E2J/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48948 page", "url": "https://www.suse.com/security/cve/CVE-2024-48948/" } ], "title": "python310-pytest-html-4.1.1-3.1 on GA media", "tracking": { "current_release_date": "2024-10-28T00:00:00Z", "generator": { "date": "2024-10-28T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14433-1", "initial_release_date": "2024-10-28T00:00:00Z", "revision_history": [ { "date": "2024-10-28T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python310-pytest-html-4.1.1-3.1.aarch64", "product": { "name": "python310-pytest-html-4.1.1-3.1.aarch64", "product_id": "python310-pytest-html-4.1.1-3.1.aarch64" } }, { "category": "product_version", "name": "python311-pytest-html-4.1.1-3.1.aarch64", "product": { "name": "python311-pytest-html-4.1.1-3.1.aarch64", "product_id": "python311-pytest-html-4.1.1-3.1.aarch64" } }, { "category": "product_version", "name": "python312-pytest-html-4.1.1-3.1.aarch64", "product": { "name": "python312-pytest-html-4.1.1-3.1.aarch64", "product_id": "python312-pytest-html-4.1.1-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python310-pytest-html-4.1.1-3.1.ppc64le", "product": { "name": "python310-pytest-html-4.1.1-3.1.ppc64le", "product_id": "python310-pytest-html-4.1.1-3.1.ppc64le" } }, { "category": "product_version", "name": "python311-pytest-html-4.1.1-3.1.ppc64le", "product": { "name": "python311-pytest-html-4.1.1-3.1.ppc64le", "product_id": "python311-pytest-html-4.1.1-3.1.ppc64le" } }, { "category": "product_version", "name": "python312-pytest-html-4.1.1-3.1.ppc64le", "product": { "name": "python312-pytest-html-4.1.1-3.1.ppc64le", "product_id": "python312-pytest-html-4.1.1-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python310-pytest-html-4.1.1-3.1.s390x", "product": { "name": "python310-pytest-html-4.1.1-3.1.s390x", "product_id": "python310-pytest-html-4.1.1-3.1.s390x" } }, { "category": "product_version", "name": "python311-pytest-html-4.1.1-3.1.s390x", "product": { "name": "python311-pytest-html-4.1.1-3.1.s390x", "product_id": "python311-pytest-html-4.1.1-3.1.s390x" } }, { "category": "product_version", "name": "python312-pytest-html-4.1.1-3.1.s390x", "product": { "name": "python312-pytest-html-4.1.1-3.1.s390x", "product_id": "python312-pytest-html-4.1.1-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python310-pytest-html-4.1.1-3.1.x86_64", "product": { "name": "python310-pytest-html-4.1.1-3.1.x86_64", "product_id": "python310-pytest-html-4.1.1-3.1.x86_64" } }, { "category": "product_version", "name": "python311-pytest-html-4.1.1-3.1.x86_64", "product": { "name": "python311-pytest-html-4.1.1-3.1.x86_64", "product_id": "python311-pytest-html-4.1.1-3.1.x86_64" } }, { "category": "product_version", "name": "python312-pytest-html-4.1.1-3.1.x86_64", "product": { "name": "python312-pytest-html-4.1.1-3.1.x86_64", "product_id": "python312-pytest-html-4.1.1-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python310-pytest-html-4.1.1-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.aarch64" }, "product_reference": "python310-pytest-html-4.1.1-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-pytest-html-4.1.1-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.ppc64le" }, "product_reference": "python310-pytest-html-4.1.1-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-pytest-html-4.1.1-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.s390x" }, "product_reference": "python310-pytest-html-4.1.1-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-pytest-html-4.1.1-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.x86_64" }, "product_reference": "python310-pytest-html-4.1.1-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python311-pytest-html-4.1.1-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.aarch64" }, "product_reference": "python311-pytest-html-4.1.1-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python311-pytest-html-4.1.1-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.ppc64le" }, "product_reference": "python311-pytest-html-4.1.1-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python311-pytest-html-4.1.1-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.s390x" }, "product_reference": "python311-pytest-html-4.1.1-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python311-pytest-html-4.1.1-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.x86_64" }, "product_reference": "python311-pytest-html-4.1.1-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python312-pytest-html-4.1.1-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.aarch64" }, "product_reference": "python312-pytest-html-4.1.1-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python312-pytest-html-4.1.1-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.ppc64le" }, "product_reference": "python312-pytest-html-4.1.1-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python312-pytest-html-4.1.1-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.s390x" }, "product_reference": "python312-pytest-html-4.1.1-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python312-pytest-html-4.1.1-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.x86_64" }, "product_reference": "python312-pytest-html-4.1.1-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-48948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48948" } ], "notes": [ { "category": "general", "text": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48948", "url": "https://www.suse.com/security/cve/CVE-2024-48948" }, { "category": "external", "summary": "SUSE Bug 1231681 for CVE-2024-48948", "url": "https://bugzilla.suse.com/1231681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1.x86_64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.aarch64", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.ppc64le", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.s390x", "openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-10-28T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-48948" } ] }
fkie_cve-2024-48948
Vulnerability from fkie_nvd
Published
2024-10-15 14:15
Modified
2025-06-20 16:18
Severity ?
Summary
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/indutny/elliptic/issues/321 | Exploit, Issue Tracking | |
cve@mitre.org | https://github.com/indutny/elliptic/pull/322 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241220-0004/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indutny:elliptic:6.5.7:*:*:*:*:node.js:*:*", "matchCriteriaId": "DCF7D11D-DB43-448B-96E4-8A5C2CAA8912", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid." }, { "lang": "es", "value": "El paquete Elliptic 6.5.7 para Node.js, en su implementaci\u00f3n para ECDSA, no verifica correctamente las firmas v\u00e1lidas si el hash contiene al menos cuatro bytes 0 iniciales y cuando el orden del punto base de la curva el\u00edptica es menor que el hash, debido a una anomal\u00eda _truncateToN. Esto hace que se rechacen firmas v\u00e1lidas. Las transacciones o comunicaciones leg\u00edtimas pueden marcarse incorrectamente como no v\u00e1lidas." } ], "id": "CVE-2024-48948", "lastModified": "2025-06-20T16:18:20.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-15T14:15:05.280", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/indutny/elliptic/issues/321" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/indutny/elliptic/pull/322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20241220-0004/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-fc9h-whq2-v747
Vulnerability from github
Published
2024-10-15 15:30
Modified
2024-12-20 15:30
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
2.3 (Low) - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
2.3 (Low) - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
VLAI Severity ?
Summary
Valid ECDSA signatures erroneously rejected in Elliptic
Details
The Elliptic prior to 6.6.0 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "elliptic" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "6.6.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-48948" ], "database_specific": { "cwe_ids": [ "CWE-347" ], "github_reviewed": true, "github_reviewed_at": "2024-10-17T22:05:18Z", "nvd_published_at": "2024-10-15T14:15:05Z", "severity": "LOW" }, "details": "The Elliptic prior to 6.6.0 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.", "id": "GHSA-fc9h-whq2-v747", "modified": "2024-12-20T15:30:47Z", "published": "2024-10-15T15:30:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48948" }, { "type": "WEB", "url": "https://github.com/indutny/elliptic/issues/321" }, { "type": "WEB", "url": "https://github.com/indutny/elliptic/pull/322" }, { "type": "WEB", "url": "https://github.com/indutny/elliptic/commit/34c853478cec1be4e37260ed2cb12cdbdc6402cf" }, { "type": "PACKAGE", "url": "https://github.com/indutny/elliptic" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20241220-0004" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Valid ECDSA signatures erroneously rejected in Elliptic" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…