grafana-pcp-5.1.1-2.el9_3.ML.1
エラータID: AXSA:2024-7657:01
リリース日:
2024/04/04 Thursday - 18:41
題名:
grafana-pcp-5.1.1-2.el9_3.ML.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Go の RSA 暗号化 / 復号化の処理には、メモリリークの
問題があるため、リモートの攻撃者により、サービス拒否
攻撃 (メモリ枯渇) を可能とする脆弱性が存在します。
(CVE-2024-1394)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-1394
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
追加情報:
N/A
ダウンロード:
SRPMS
- grafana-pcp-5.1.1-2.el9_3.ML.1.src.rpm
MD5: 55f89781e7ee97263800d7e4e3d452c4
SHA-256: 76a57d657abf8674a4c4ce0e21782029cac4bd7119bc222b62f8a3611556eb97
Size: 59.22 MB
Asianux Server 9 for x86_64
- grafana-pcp-5.1.1-2.el9_3.ML.1.x86_64.rpm
MD5: e4a7e05368b63dcde4adc9ebe43771dd
SHA-256: fe0917a8c37915273557e7c5b8e612137df7152503df1b7b2057cb10aba3f2d4
Size: 10.26 MB