grafana-pcp-5.1.1-2.el9.ML.1
エラータID: AXSA:2024-7799:03
リリース日:
2024/05/29 Wednesday - 20:40
題名:
grafana-pcp-5.1.1-2.el9.ML.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Go の RSA 暗号化 / 復号化の処理には、メモリリークの
問題があるため、リモートの攻撃者により、サービス拒否
攻撃 (メモリ枯渇) を可能とする脆弱性が存在します。
(CVE-2024-1394)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-1394
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
追加情報:
N/A
ダウンロード:
SRPMS
- grafana-pcp-5.1.1-2.el9.ML.1.src.rpm
MD5: 75fdf7754c3dd9ad29cc3adf6119d474
SHA-256: 77d02f4b43d2e9e8c9c6edd4c81ba5419830387c0d62333fbb850c049c94fe2b
Size: 59.22 MB
Asianux Server 9 for x86_64
- grafana-pcp-5.1.1-2.el9.ML.1.x86_64.rpm
MD5: fa842377f20e78387c7134f2703c8ddc
SHA-256: f610e01515283d1dd7071d125e2c51f1e928814b4b5058512108c6f36bc0404c
Size: 10.25 MB