Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

9-5-24 cve updates #3810

Merged
merged 3 commits into from
Sep 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
44 changes: 44 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2021-46848.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
sidebar_label: "CVE-2021-46848"
title: "CVE-2021-46848"
description: "Lifecycle of CVE-2021-46848"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2021-46848](https://nvd.nist.gov/vuln/detail/CVE-2021-46848)

## Last Update

9/5/24

## NIST CVE Summary

GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.

## Our Official Summary

This is a vulnerability reported in GNU Libtasn1 before version 4.19.0, a library used to manage the ASN.1 data
structure. This vulnerability is caused by an off-by-one array size check issue, leading to an out-of-bounds read.
Impacting systems using GNU Libtasn1 before 4.19.0. Waiting on an upstream fix.

## CVE Severity

[9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

48 changes: 48 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-0760.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
---
sidebar_label: "CVE-2024-0760"
title: "CVE-2024-0760"
description: "Lifecycle of CVE-2024-0760"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-0760](https://nvd.nist.gov/vuln/detail/CVE-2024-0760)

## Last Update

9/5/24

## NIST CVE Summary

A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the
attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'ACLs'?

issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.

## Our Official Summary

A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the
attack is in progress. The server may recover after the attack ceases. In order to exploit this vulnerability, image in
which this cve is reported has to be compromised and hacker has to gain privileged access. There are sufficient controls
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'cve'?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[write-good.ThereIs] Don't start a sentence with 'There are'.

in place to consider the probability of occurrence as low. There is a fix available upstream and we are investigating
upgrading to the fixed version.

## CVE Severity

[7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-0760)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

51 changes: 51 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-1737.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
---
sidebar_label: "CVE-2024-1737"
title: "CVE-2024-1737"
description: "Lifecycle of CVE-2024-1737"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-1737](https://nvd.nist.gov/vuln/detail/CVE-2024-1737)

## Last Update

9/5/24

## NIST CVE Summary

Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'RRs'?

RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries
for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through
9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through
9.18.27-S1.

## Our Official Summary

This vulnerability can be exploited if resolver caches and authoritative zone databases hold significant numbers of RRs
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'RRs'?

for the same hostname (of any RTYPE). Services will suffer from degraded performance as content is being added or
updated, and also when handling client queries for this name. In order to exploit this vulenerability, image in which
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'vulenerability'?

this cve is reported has to be compromised and hacker has to gain privileged access. There are sufficient controls in
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'cve'?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[write-good.ThereIs] Don't start a sentence with 'There are'.

place to consider the probability of occurence as low. There is a fix available upstream and we are investigating
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'occurence'?

upgrading to the fixed version.

## CVE Severity

[7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1737)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

49 changes: 49 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-1975.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
---
sidebar_label: "CVE-2024-1975"
title: "CVE-2024-1975"
description: "Lifecycle of CVE-2024-1975"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-1975](https://nvd.nist.gov/vuln/detail/CVE-2024-1975)

## Last Update

9/5/24

## NIST CVE Summary

If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from
a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed
requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27,
9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.

## Our Official Summary

This vulnerability can be exploited by a client only if a server hosts a zone containing a “KEY” Resource Record, or a
resolver DNSSEC-validates a “KEY” Resource Record from a DNSSEC-signed domain in cache. In order to exploit this
vulenerability, image in which this cve is reported has to be compromised and hacker has to gain privileged access.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'vulenerability'?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'cve'?

There are sufficient controls in place to consider the probability of occurence as low. There is a fix available
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[write-good.ThereIs] Don't start a sentence with 'There are'.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'occurence'?

upstream and we are investigating upgrading to the fixed version.

## CVE Severity

[7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1975)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
karl-cardenas-coding marked this conversation as resolved.
Show resolved Hide resolved
- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
karl-cardenas-coding marked this conversation as resolved.
Show resolved Hide resolved
42 changes: 42 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-45490.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
---
sidebar_label: "CVE-2024-45490"
title: "CVE-2024-45490"
description: "Lifecycle of CVE-2024-45490"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490)

## Last Update

9/5/24

## NIST CVE Summary

An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libexpat'?


## Our Official Summary

Our official summary coming soon.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.future] Avoid documenting features that are not available at present. You mentioned 'coming soon'.


## CVE Severity

[9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45490)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

43 changes: 43 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-45491.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
---
sidebar_label: "CVE-2024-45491"
title: "CVE-2024-45491"
description: "Lifecycle of CVE-2024-45491"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-45491](https://nvd.nist.gov/vuln/detail/CVE-2024-45491)

## Last Update

9/5/24

## NIST CVE Summary

An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on
karl-cardenas-coding marked this conversation as resolved.
Show resolved Hide resolved
karl-cardenas-coding marked this conversation as resolved.
Show resolved Hide resolved
32-bit platforms (where UINT_MAX equals SIZE_MAX).

## Our Official Summary

Our official summary coming soon.
karl-cardenas-coding marked this conversation as resolved.
Show resolved Hide resolved

## CVE Severity

[9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45491)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

43 changes: 43 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-45492.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
---
sidebar_label: "CVE-2024-45492"
title: "CVE-2024-45492"
description: "Lifecycle of CVE-2024-45492"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-45492](https://nvd.nist.gov/vuln/detail/CVE-2024-45492)

## Last Update

9/5/24

## NIST CVE Summary

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libexpat'?

m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

## Our Official Summary

Our official summary coming soon.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.future] Avoid documenting features that are not available at present. You mentioned 'coming soon'.


## CVE Severity

[9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45492)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

43 changes: 43 additions & 0 deletions docs/docs-content/security-bulletins/reports/cve-2024-6232.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
---
sidebar_label: "CVE-2024-6232"
title: "CVE-2024-6232"
description: "Lifecycle of CVE-2024-6232"
hide_table_of_contents: true
sidebar_class_name: "hide-from-sidebar"
toc_max_heading_level: 2
tags: ["security", "cve"]
---

## CVE Details

[CVE-2024-6232](https://nvd.nist.gov/vuln/detail/CVE-2024-6232)

## Last Update

9/5/24

## NIST CVE Summary

There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'CPython'?

during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.LyHyphens] 'specifically-crafted' doesn't need a hyphen.


## Our Official Summary

Our official summary coming soon.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.future] Avoid documenting features that are not available at present. You mentioned 'coming soon'.


## CVE Severity

[7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-6232)

## Status

Ongoing

## Affected Products & Versions

- Palette VerteX 4.4.14

## Revision History

- 1.0 09/05/2024 Initial Publication
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

- 2.0 09/05/2024 Added Palette VerteX 4.4.14 to Affected Products
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/05/2024'.

Loading