grafana-pcp-5.1.1-2.el8_9.ML.1
エラータID: AXSA:2024-7661:02
リリース日:
2024/04/05 Friday - 21:17
題名:
grafana-pcp-5.1.1-2.el8_9.ML.1
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Go の RSA 暗号化 / 復号化の処理には、メモリリークの
問題があるため、リモートの攻撃者により、サービス拒否
攻撃 (メモリ枯渇) を可能とする脆弱性が存在します。
(CVE-2024-1394)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-1394
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
追加情報:
N/A
ダウンロード:
SRPMS
- grafana-pcp-5.1.1-2.el8_9.ML.1.src.rpm
MD5: a2fed62932687bb5d5d6e4e8eb7deb7f
SHA-256: 0300c4819a9a297610cde99b50022ce2de656f53078e80c102450b5e173d87ec
Size: 59.22 MB
Asianux Server 8 for x86_64
- grafana-pcp-5.1.1-2.el8_9.ML.1.x86_64.rpm
MD5: c71ccba063ca52f4d4672e587e95662e
SHA-256: 3b44e859998eef71b3fe72ea44812a8afaca6d7800bab7515d7100900d5e925e
Size: 10.68 MB