Update 20240420071526 (#418)

feat: Updated at 20240420071526

Signed-off-by: bitnami-bot <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot 2024-04-20 09:50:17 +02:00 committed by GitHub
parent c2d47a8455
commit f07c06cbfa
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
19 changed files with 221 additions and 17 deletions

View File

@ -0,0 +1,48 @@
{
"schema_version": "1.5.0",
"id": "BIT-airflow-2024-31869",
"details": "Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the \"configuration\" UI page when \"non-sensitive-only\" was set as \"webserver.expose_config\" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your \"expose_config\" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.",
"aliases": [
"CVE-2024-31869"
],
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "airflow",
"purl": "pkg:bitnami/airflow"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "2.7.0"
},
{
"fixed": "2.8.4"
}
]
}
]
}
],
"database_specific": {
"severity": "Unknown",
"cpes": [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
]
},
"references": [
{
"type": "WEB",
"url": "https://github.com/apache/airflow/pull/38795"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/pz6vg7wcjk901rmsgt86h76g6kfcgtk3"
}
],
"published": "2024-04-20T07:16:43.969Z",
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -37,8 +37,16 @@
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
],
"published": "2024-04-06T18:17:43.564Z",
"modified": "2024-04-06T18:51:13.710Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -37,8 +37,16 @@
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
],
"published": "2024-04-06T18:17:14.870Z",
"modified": "2024-04-06T18:51:13.710Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -0,0 +1,72 @@
{
"schema_version": "1.5.0",
"id": "BIT-envoy-2024-32475",
"details": "Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting SNI for outbound TLS connection. The error can occur when Envoy attempts to use the `host`/`:authority` header value longer than 255 characters as SNI for outbound TLS connection. SNI length is limited to 255 characters per the standard. Envoy always expects this operation to succeed and abnormally aborts the process when it fails. This vulnerability is fixed in 1.30.1, 1.29.4, 1.28.3, and 1.27.5.",
"aliases": [
"CVE-2024-32475"
],
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "envoy",
"purl": "pkg:bitnami/envoy"
},
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.30.0"
},
{
"fixed": "1.30.1"
},
{
"introduced": "1.29.0"
},
{
"fixed": "1.29.4"
},
{
"introduced": "1.28.0"
},
{
"fixed": "1.28.3"
},
{
"introduced": "1.13.0"
},
{
"fixed": "1.27.5"
}
]
}
]
}
],
"database_specific": {
"severity": "High",
"cpes": [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
]
},
"references": [
{
"type": "WEB",
"url": "https://github.com/envoyproxy/envoy/commit/b47fc6648d7c2dfe0093a601d44cb704b7bad382"
},
{
"type": "WEB",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3mh5-6q8v-25wj"
}
],
"published": "2024-04-20T07:17:35.607Z",
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -55,8 +55,12 @@
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240419-0009/"
}
],
"published": "2024-04-06T18:19:39.789Z",
"modified": "2024-04-06T18:51:13.710Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445069"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179427"
}
],
"published": "2024-03-06T11:01:34.997Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445061"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179406"
}
],
"published": "2024-03-06T11:00:53.463Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445062"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179412"
}
],
"published": "2024-03-06T11:00:43.602Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445063"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179418"
}
],
"published": "2024-03-06T11:00:32.094Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445064"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179419"
}
],
"published": "2024-03-06T11:00:21.482Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445065"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179422"
}
],
"published": "2024-03-06T11:00:15.007Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -69,8 +69,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445066"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179423"
}
],
"published": "2024-03-06T11:00:05.402Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -50,8 +50,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445067"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179424"
}
],
"published": "2024-03-06T10:59:55.273Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -99,8 +99,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=445068"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179426"
}
],
"published": "2024-03-06T10:59:47.976Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -75,8 +75,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=447829"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214369"
}
],
"published": "2024-03-06T10:59:19.194Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -81,8 +81,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=447830"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214371"
}
],
"published": "2024-03-06T10:59:08.929Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -81,8 +81,12 @@
{
"type": "WEB",
"url": "https://moodle.org/mod/forum/discuss.php?d=447831"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214373"
}
],
"published": "2024-03-06T10:58:57.190Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -83,8 +83,20 @@
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5277"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSJVPJTX7T3J5V7XHR4MFNHZGP44R5XE/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/"
}
],
"published": "2024-03-06T11:03:40.403Z",
"modified": "2024-03-06T11:25:28.861Z"
"modified": "2024-04-20T07:49:38.167Z"
}

View File

@ -85,8 +85,12 @@
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU/"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240419-0008/"
}
],
"published": "2024-03-12T08:33:54.711Z",
"modified": "2024-04-19T07:51:49.730Z"
"modified": "2024-04-20T07:49:38.167Z"
}