⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-6841
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Keycloak: amount of attributes per object is not limited and it may lead to dos

A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values.

keycloak
<24.0.0
rh-sso7-keycloak

pkgs.keycloak

Identity and access management for modern applications and services
Package maintainers: 3
CVE-2024-1394
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Golang-fips/openssl: memory leaks in code encrypting and decrypting rsa payloads

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

mcg
odo
rhc
etcd
*
helm
rosa
runc
*
cri-o
*
rhcos
*
butane
*
conmon
*
golang
*
heketi
podman
*
skopeo
*
buildah
*
git-lfs
grafana
*
rsyslog
toolbox
ignition
*
kubevirt
ovn23.09
*
receptor
*
conmon-rs
cri-tools
*
openshift
*
microshift
*
grafana-pcp
*
qpid-proton
skupper-cli
weldr-client
host-metering
skupper-router
openshift-kuryr
*
go-toolset:rhel8
*
gvisor-tap-vsock
*
osbuild-composer
*
openshift-ansible
*
openshift-clients
*
rh-git227-git-lfs
rhc-worker-script
golang-qpid-apache
openshift4-aws-iso
*
collectd-sensubility
*
container-tools:rhel8
*
go-toolset-1.19-golang
*
odf4/mcg-rhel9-operator
*
container-tools:4.0/runc
odf4/mcg-operator-bundle
*
container-tools:4.0/conmon
container-tools:4.0/podman
container-tools:4.0/skopeo
container-tools:rhel8/runc
openshift-pipelines-client
container-tools:4.0/buildah
container-tools:4.0/toolbox
containernetworking-plugins
*
devspaces/machineexec-rhel8
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
openshift-serverless-clients
container-tools:rhel8/buildah
container-tools:rhel8/toolbox
golang-github-prometheus-promu
redhat-certification-preflight
tang-operator-bundle-container
golang-github-infrawatch-apputils
ose-aws-ecr-image-credential-provider
*
openshift4/ose-cluster-machine-approver
openshift4/numaresources-operator-bundle
lifecycle-agent-operator-bundle-container
openshift-gitops-1/gitops-operator-bundle
openshift4/ose-cluster-machine-approver-rhel9
container-tools:4.0/containernetworking-plugins
container-tools:rhel8/containernetworking-plugins
openshift4/bare-metal-event-relay-operator-bundle
openshift4/topology-aware-lifecycle-manager-operator-bundle
CVE-2024-9355
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 8 months, 2 weeks ago
Golang-fips: golang fips zeroed buffer

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

mcg
odo
rhc
etcd
helm
rosa
runc
cri-o
delve
butane
conmon
golang
*
heketi
podman
skopeo
buildah
git-lfs
*
grafana
*
rsyslog
toolbox
ignition
kubevirt
receptor
conmon-rs
cri-tools
openshift
yggdrasil
microshift
grafana-pcp
*
qpid-proton
skupper-cli
weldr-client
host-metering
skupper-router
go-toolset:rhel8
*
gvisor-tap-vsock
osbuild-composer
*
containers-common
openshift-clients
rhc-worker-script
*
foreman_ygg_worker
*
golang-qpid-apache
rhtas/fulcio-rhel9
go-toolset:rhel8/golang
opentelemetry-collector
automation-gateway-proxy
openshift4/rdma-cni-rhel9
satellite:el8/qpid-proton
container-tools:rhel8/runc
openshift-pipelines-client
yggdrasil-worker-forwarder
containernetworking-plugins
devspaces/machineexec-rhel8
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
openshift-serverless-clients
container-tools:rhel8/buildah
container-tools:rhel8/toolbox
github.com/golang-fips/openssl
golang-github-prometheus-promu
tang-operator-bundle-container
yggdrasil-worker-package-manager
golang-github-infrawatch-apputils
satellite-capsule:el8/qpid-proton
golang-github-openprinting-ipp-usb
openshift4/ose-sriov-rdma-cni-rhel9
ose-aws-ecr-image-credential-provider
ose-gcp-gcr-image-credential-provider
golang-github-danielqsj-kafka_exporter
ose-azure-acr-image-credential-provider
openshift4/numaresources-operator-bundle
satellite:el8/yggdrasil-worker-forwarder
lifecycle-agent-operator-bundle-container
openshift-gitops-1/gitops-operator-bundle
openshift4/ose-vertical-pod-autoscaler-rhel8
openshift4/ose-vertical-pod-autoscaler-rhel9
openshift4/ose-gcp-filestore-csi-driver-rhel8
openshift4/ose-gcp-filestore-csi-driver-rhel9
openshift4/ose-secrets-store-csi-driver-rhel8
openshift4/ose-secrets-store-csi-driver-rhel9
openshift4/sriov-network-metrics-exporter-rhel9
container-tools:rhel8/containernetworking-plugins
openshift4/bare-metal-event-relay-operator-bundle
openshift4/ose-aws-efs-csi-driver-container-rhel8
openshift4/ose-aws-efs-csi-driver-container-rhel9
openshift4/ose-sriov-network-metrics-exporter-rhel9
openshift4/topology-aware-lifecycle-manager-operator-bundle
CVE-2024-3727
8.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Containers/image: digest type does not guarantee valid type

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

cri-o
*
image
<5.30.1
<5.29.3
rhcos
*
conmon
podman
*
skopeo
*
buildah
*
atomic-openshift
osbuild-composer
containers-common
openshift-clients
openshift4/ose-cli
devspaces/udi-rhel8
openshift4/ose-tests
*
container-tools:rhel8
*
openshift4/ose-console
*
openshift4/ose-deployer
quay/quay-builder-rhel8
openshift4/ose-installer
openshift4/ose-sdn-rhel9
*
ocp-tools-4/jenkins-rhel8
source-to-image-container
container-tools:4.0/conmon
container-tools:4.0/podman
container-tools:4.0/skopeo
openshift4/ose-tools-rhel8
*
container-tools:4.0/buildah
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
openshift-serverless-clients
openshift4/ose-cli-artifacts
container-tools:rhel8/buildah
oadp/oadp-velero-plugin-rhel8
oadp/oadp-velero-plugin-rhel9
*
openshift4/ose-docker-builder
*
multicluster-engine/hive-rhel8
multicluster-engine/hive-rhel9
openshift4/network-tools-rhel8
*
openshift4/ose-hypershift-rhel9
*
openshift4/ose-olm-rukpak-rhel8
openshift4/ose-operator-registry
rhacm2/submariner-rhel8-operator
openshift4/oc-mirror-plugin-rhel8
openshift4/oc-mirror-plugin-rhel9
*
openshift4/ose-installer-artifacts
osp-director-provisioner-container
virt-cdi-apiserver-rhel9-container
openshift4/assisted-installer-rhel8
openshift4/ose-ovn-kubernetes-rhel9
*
ocp-tools-4/jenkins-agent-base-rhel8
container-tools:4.0/containers-common
source-to-image/source-to-image-rhel8
openshift-serverless-1/client-kn-rhel8
openshift4/ose-insights-rhel9-operator
*
openshift4/ose-machine-config-operator
openshift4/ose-operator-registry-rhel9
*
container-tools:rhel8/containers-common
multicluster-engine/agent-service-rhel8
openshift4/ose-installer-altinfra-rhel8
openshift4/ose-installer-altinfra-rhel9
openshift4/ose-baremetal-installer-rhel7
openshift4/ose-baremetal-installer-rhel8
openshift4/ose-openshift-apiserver-rhel7
openshift4/ose-openshift-apiserver-rhel8
openshift4/ose-openshift-apiserver-rhel9
*
openshift4/assisted-installer-agent-rhel8
openshift4/ose-machine-api-rhel9-operator
*
openshift4/ose-operator-lifecycle-manager
*
advanced-cluster-security/rhacs-main-rhel8
*
ose-openshift-controller-manager-container
rhai-tech-preview/assisted-installer-rhel8
rhmtc/openshift-migration-controller-rhel8
*
ose-installer-terraform-providers-container
advanced-cluster-security/rhacs-roxctl-rhel8
*
multicluster-engine/assisted-installer-rhel8
openshift4/assisted-installer-reporter-rhel8
openshift4/ose-apiserver-network-proxy-rhel9
*
openshift4/ose-machine-config-rhel9-operator
*
openshift4/ose-olm-operator-controller-rhel8
openshift4/ose-olm-operator-controller-rhel9
*
advanced-cluster-security/rhacs-scanner-rhel8
*
openshift4/ose-cluster-ingress-rhel9-operator
*
openshift4/ose-cluster-network-rhel9-operator
*
rhacm2-tech-preview/submariner-rhel8-operator
advanced-cluster-security/rhacs-rhel8-operator
*
openshift4/ose-openshift-proxy-pull-test-rhel8
openshift4/ose-ovn-kubernetes-microshift-rhel9
*
advanced-cluster-security/rhacs-collector-rhel8
*
advanced-cluster-security/rhacs-operator-bundle
*
container-native-virtualization/virt-cdi-cloner
openshift4/ose-agent-installer-api-server-rhel8
*
openshift4/ose-agent-installer-api-server-rhel9
*
openshift4/ose-agent-installer-node-agent-rhel8
openshift4/ose-agent-installer-node-agent-rhel9
*
openshift4/ose-operator-lifecycle-manager-rhel9
*
advanced-cluster-security/rhacs-central-db-rhel8
*
advanced-cluster-security/rhacs-scanner-db-rhel8
*
advanced-cluster-security/rhacs-scanner-v4-rhel8
*
openshift4/ose-alibaba-machine-controllers-rhel9
*
openshift4/ose-cluster-autoscaler-rhel9-operator
*
openshift4/ose-multus-admission-controller-rhel9
*
openshift4/ose-multus-whereabouts-ipam-cni-rhel8
*
openshift4/ose-nutanix-machine-controllers-rhel9
*
openshift4/ose-powervs-machine-controllers-rhel9
*
rhai-tech-preview/assisted-installer-agent-rhel8
container-native-virtualization/virt-cdi-importer
container-native-virtualization/virt-cdi-operator
openshift-sandboxed-containers/osc-rhel8-operator
openshift-sandboxed-containers/osc-rhel9-operator
openshift4/ose-agent-installer-csr-approver-rhel8
openshift4/ose-agent-installer-csr-approver-rhel9
openshift4/ose-agent-installer-orchestrator-rhel8
*
openshift4/ose-agent-installer-orchestrator-rhel9
*
openshift4/ose-cluster-node-tuning-rhel9-operator
*
openshift4/ose-openshift-controller-manager-rhel7
openshift4/ose-openshift-controller-manager-rhel8
openshift4/ose-openshift-controller-manager-rhel9
*
advanced-cluster-security/rhacs-scanner-slim-rhel8
*
container-native-virtualization/virt-cdi-apiserver
multicluster-engine/assisted-installer-agent-rhel8
advanced-cluster-security/rhacs-scanner-v4-db-rhel8
*
container-native-virtualization/virt-cdi-controller
rhai-tech-preview/assisted-installer-reporter-rhel8
advanced-cluster-security/rhacs-collector-slim-rhel8
*
container-native-virtualization/virt-cdi-uploadproxy
openshift-sandboxed-containers/osc-must-gather-rhel8
openshift-sandboxed-containers/osc-must-gather-rhel9
advanced-cluster-security/rhacs-scanner-db-slim-rhel8
*
container-native-virtualization/virt-cdi-cloner-rhel9
container-native-virtualization/virt-cdi-uploadserver
multicluster-engine/assisted-installer-reporter-rhel8
openshift4/ose-powervs-cloud-controller-manager-rhel9
*
multicluster-engine-assisted-installer-agent-container
container-native-virtualization/virt-cdi-importer-rhel9
container-native-virtualization/virt-cdi-operator-rhel9
container-native-virtualization/virt-cdi-apiserver-rhel9
container-native-virtualization/virt-cdi-controller-rhel9
*
container-native-virtualization/virt-cdi-uploadproxy-rhel9
container-native-virtualization/virt-cdi-uploadserver-rhel9
openshift-sandboxed-containers-tech-preview/osc-rhel8-operator
openshift4/ose-cluster-control-plane-machine-set-rhel9-operator
*
openshift-sandboxed-containers-tech-preview/osc-must-gather-rhel8
CVE-2024-6156
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Mark Laing discovered that LXD's PKI mode, until version 5.21.2, …

Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.

lxd
<5.0.4
<6.1
<5.21.2
<4.0.10
CVE-2024-9902
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 8 months, 2 weeks ago
Ansible-core: ansible-core user may read/write unauthorized content

A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.

ansible-core
*
openstack-ansible-core
ansible-automation-platform/ee-29-rhel8
*
ansible-automation-platform/ee-minimal-rhel8
*
ansible-automation-platform/ee-minimal-rhel9
*
ansible-automation-platform/ansible-builder-rhel8
*
ansible-automation-platform/ansible-builder-rhel9
*
CVE-2024-8676
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Cri-o: checkpoint restore can be triggered from different namespaces

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

cri-o
<1.30.8
*
<1.29.11
<1.31.3
rhcos
*
conmon
container-tools:rhel8/conmon
container-tools:rhel8/podman
CVE-2024-52615
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Avahi: avahi wide-area dns uses constant source port

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

avahi
*
<0.9
rhcos
CVE-2024-49395
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Mutt: neomutt: bcc email header field is indirectly leaked by cryptographic info block

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

mutt
CVE-2024-49394
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

mutt