-
Notifications
You must be signed in to change notification settings - Fork 37
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* docs: add 2 new cves to security bulletin * 2 new CVEs on 08032024 * Updated with our official summaries * docs: make format --------- Co-authored-by: Lenny Chen <lenny.chen@spectrocloud.com> Co-authored-by: JamieM-Spectro <jamie@spectrocloud.com>
- Loading branch information
Showing
3 changed files
with
73 additions
and
36 deletions.
There are no files selected for viewing
35 changes: 35 additions & 0 deletions
35
docs/docs-content/security-bulletins/reports/cve-2024-24790.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
--- | ||
sidebar_label: "CVE-2024-24790" | ||
title: "CVE-2024-24790" | ||
description: "Lifecycle of CVE-2024-24790" | ||
hide_table_of_contents: true | ||
sidebar_class_name: "hide-from-sidebar" | ||
toc_max_heading_level: 2 | ||
tags: ["security", "cve"] | ||
--- | ||
|
||
## CVE Details | ||
|
||
[CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | ||
|
||
## Last Update | ||
|
||
08/06/2024 | ||
|
||
## NIST CVE Summary | ||
|
||
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning | ||
false for addresses which would return true in their traditional IPv4 forms. | ||
|
||
## Our Official Summary | ||
|
||
Waiting on the 3rd party vendor for a fix. Notes: This vulnerability is reported on the mongodb container. A ticket is | ||
filed with the vendor to get a new image that addresses the vulnerabilities reported. | ||
|
||
## CVE Severity | ||
|
||
[9.8](hhttps://nvd.nist.gov/vuln/detail/CVE-2024-24790) | ||
|
||
## Status | ||
|
||
Ongoing |
37 changes: 37 additions & 0 deletions
37
docs/docs-content/security-bulletins/reports/ghsa-74fp-r6jw-h4mp.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
--- | ||
sidebar_label: "GHSA-74fp-r6jw-h4mp" | ||
title: "GHSA-74fp-r6jw-h4mp" | ||
description: "Lifecycle of GHSA-74fp-r6jw-h4mp" | ||
hide_table_of_contents: true | ||
sidebar_class_name: "hide-from-sidebar" | ||
toc_max_heading_level: 2 | ||
tags: ["security", "cve"] | ||
--- | ||
|
||
## CVE Details | ||
|
||
[GHSA-m425-mq94-257g](https://github.com/advisories/ghsa-74fp-r6jw-h4mp) | ||
|
||
## Last Update | ||
|
||
08/06/2024 | ||
|
||
## NIST CVE Summary | ||
|
||
Kubernetes apimachinery packages vulnerable to unbounded recursion in JSON or YAML parsing | ||
|
||
## Our Official Summary | ||
|
||
This vulnerability is reported by govulncheck because of the presence of go library, k8s.io/apimachinery (Affected | ||
versions: \< 0.0.0-20190927203648-9ce6eca90e73). This is a false positive, because it does not affect latest kubernetes | ||
versions as indicated here | ||
([https://nvd.nist.gov/vuln/detail/CVE-2019-11253](https://nvd.nist.gov/vuln/detail/CVE-2019-11253)). Current K8s | ||
version used: 1.28.11 | ||
|
||
## CVE Severity | ||
|
||
[7.5](https://github.com/advisories/ghsa-74fp-r6jw-h4mp) | ||
|
||
## Status | ||
|
||
Ongoing |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters