ID

VAR-202203-0925


CVE

CVE-2022-24761


TITLE

Agendaless Consulting  of  Waitress  in products from other multiple vendors  HTTP  Request Smuggling Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-007193

DESCRIPTION

Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead. Agendaless Consulting of Waitress For products from other vendors, HTTP There is a vulnerability related to request smuggling.Information may be tampered with. No detailed vulnerability details are currently provided. ========================================================================= Ubuntu Security Notice USN-5364-1 April 05, 2022 waitress vulnerability ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS Summary: waitress could be made to expose sensitive information if it received a specially crafted request. Software Description: - waitress: production-quality pure-Python WSGI server (documentation) Details: It was discovered that Waitress incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: python3-waitress 1.4.4-1.1ubuntu0.1 Ubuntu 20.04 LTS: python3-waitress 1.4.1-1ubuntu0.1 In general, a standard system update will make all the necessary changes. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.10.10 bug fix and security update Advisory ID: RHSA-2022:1356-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:1356 Issue date: 2022-04-21 CVE Names: CVE-2022-0778 CVE-2022-21698 CVE-2022-24761 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.10.10 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.10. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:1355 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html Security Fix(es): * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-x86_64 The image digest is sha256:39efe13ef67cb4449f5e6cdd8a26c83c07c6a2ce5d235dfbc3ba58c64418fcf3 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-s390x The image digest is sha256:49b63b22bc221e29e804fc3cc769c6eff97c655a1f5017f429aa0dad2593a0a8 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-ppc64le The image digest is sha256:0d34e1198679a500a3af7acbdfba7864565f7c4f5367ca428d34dee9a9912c9c (For aarch64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-aarch64 The image digest is sha256:ddf6cb04e74ac88874793a3c0538316c9ac8ff154267984c8a4ea7047913e1db All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2050118 - 4.10: oVirt CSI driver should use the trusted CA bundle when cluster proxy is configured 2052414 - Start last run action should contain current user name in the started-by annotation of the PLR 2054404 - ip-reconcile job is failing consistently 2054767 - [ovn] Missing lr-policy-list and snat rules for egressip when new pods are added 2054808 - MetaLLB: Validation Webhook: BGPPeer hold time is allowed to be set to less than 3s 2055661 - migrate loadbalancers from amphora to ovn not working 2057881 - MetalLB: speaker metrics is not updated when deleting a service 2059347 - FSyncControllerDegraded latches True, even after fsync latency recovers on all members 2059945 - MetalLB: Move CI config files to metallb repo from dev-scripts repo 2060362 - Openshift registry starts to segfault after S3 storage configuration 2060586 - [4.10.z] [RFE] use /dev/ptp_hyperv on Azure/AzureStack 2064204 - Cachito request failure with vendor directory is out of sync with go.mod/go.sum 2064988 - Fix the hubUrl docs link in pipeline quicksearch modal 2065488 - ip-reconciler job does not complete, halts node drain 2065832 - oc mirror hangs when processing the Red Hat 4.10 catalog 2067311 - PPT event source is lost when received by the consumer 2067719 - Update channels information link is taking to a 404 error page 2069095 - cluster-autoscaler-default will fail when automated etcd defrag is running on large scale OpenShift Container Platform 4 - Cluster 2069913 - Disabling community tasks is not working 2070131 - Installation of Openshift virtualization fails with error service "hco-webhook-service" not found 2070492 - [4.10.z backport] On OCP 4.10+ using OVNK8s on BM IPI, nodes register as localhost.localdomain 2070525 - [OCPonRHV]- after few days that cluster is alive we got error in storage operator 2071479 - Thanos Querier high CPU and memory usage till OOM 2072191 - [4.10] cluster storage operator AWS credentialsrequest lacks KMS privileges 2072440 - Pipeline builder makes too many (100+) API calls upfront 2072928 - mapi_current_pending_csr is always set to 1 on OpenShift Container Platform 5. References: https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-24761 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYmKAiNzjgjWX9erEAQgHWBAAqLcu1AIPSmb6HQhgFAZZikkCO03Lp/7U rx3bU0VboglkT+H/Y5aInA4O25WvaU0U+DsmnHduOJY1XKifVgdMSwZSqek6NGxl abQhbNwWbgNAaE69MQdiosSeDNnpqd9WMCLUWS7hj5Bc0Ry69UzS+dK0RcKUblTM UXG+Sun3pphJ9fZ4dL9J20lO3iFiYcgGRv8jcOsujx/yhtdbIHgxmjaZOccRNTCH gYCRUX93A/ReKQBJuQJKyfWpN8jmJAZaDak1VlokZJURFQE7VN45dPFQA6xtAe03 6WVSvmBR1K9QmTJq6AwTe50uIQfITcjWwspd3fygCSIn14Z2t6U77y3EbzsIS5dM XWVJo0CLDVfel9cH76WjYX4GixcfR1uhuNl+twalxb2COZmFkq7X7tzAvfyFWF/S GMDCAAMleN2x/WTX+ZOTrte6hdvSaiZBsWRX++yX/vIlU9mgHs7e7NwZA56o9Flq UlFk8Pc6cZq50aifANU4l+nLrRrV/WlOqCxTz6tGwzgllbLgfQ9XZDbjCse9zrL8 F36ynyc5GItFG66etS9KrBVMLaIyhM4Fok4HQNE1yGLHYOT9NQNZsKs4ud7Y1Rzw h7AATArTVib7QU0B+keHW3A3Rm2KYsbzBHsbDBntr3PU8Knl4rAR2OA1lYfMLW67 lYpMfdzvmvo=qbsg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . For the oldstable distribution (buster), this problem has been fixed in version 1.2.0~b2-2+deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 1.4.4-1.1+deb11u1. We recommend that you upgrade your waitress packages. For the detailed security status of waitress please refer to its security tracker page at: https://security-tracker.debian.org/tracker/waitress Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmKD8WsACgkQEMKTtsN8 Tjb1Bw//WO0r4iACwUTMxAPD5EowBLhLcywGHly+MDEN1/2HHBq/wRhJK5J7HNt+ wdeYcbeJe8Jjm0iKnN8uetu+vr4wWRF33pDXj8GrT06chctnCwv4hEKpMTZLOZuw 2CaW5c80eKMGM7MVVjSYzCXGZ2Xp8pJml3J4T3u8V9KgW6QzPX6vKVzeQkWEpXFP 4uN35ZcPTgDWmBdtKaH76DwxB8roaN98ZgPQGsvhs6OLHqifDIik5q03zZPylJD2 Ji81zKIjBhQbsyOnE8lrtE4h7RvgjTldl5dkzK9QQYnRFq8B8lLJHZdnZGlfGvD8 /dccVQT+UJWdV14fe5amlMBsbbs2gn0QwQmHLYYACVdQXo6dY7VQgy9uIUO8CaR+ QHEJYZFz4ddaPOkjfq7MyjPPXzM4RnbG2Vbr73hrfhnSFPmZfzc0hqjHKJVqBAOK ZU3mYEr0whU2CqG5ERRspQCdgSckV1rmtw8odWdkP8nmj4ZgCMtbScJCkfPEpwP2 83FPPh8+P9Rudom8RQvduHjr/3HweVvYGfmcws2QV+ffGiz7rwaiKZPG+fjFyXrq UUBrFeseVsgaCEmq0x5S3r9XgL0YI7zXqNyTDZKDF5SrbRC7FVuPOzR1/kzZo2l2 DE5bBtA+ViL7Oqqo0AkAy1rLh6gTMnmwLBKz6okgCkgRQYefrrg= =zbZ1 -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2022-24761 // JVNDB: JVNDB-2022-007193 // CNVD: CNVD-2022-21483 // VULMON: CVE-2022-24761 // PACKETSTORM: 166645 // PACKETSTORM: 166594 // PACKETSTORM: 166605 // PACKETSTORM: 166620 // PACKETSTORM: 166818 // PACKETSTORM: 169389

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-21483

AFFECTED PRODUCTS

vendor:agendalessmodel:waitressscope:ltversion:2.1.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:agendaless consultingmodel:waitressscope: - version: -

Trust: 0.8

vendor:waitressmodel:waitressscope:lteversion:<=2.1.0

Trust: 0.6

sources: CNVD: CNVD-2022-21483 // JVNDB: JVNDB-2022-007193 // NVD: CVE-2022-24761

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-24761
value: HIGH

Trust: 1.0

security-advisories@github.com: CVE-2022-24761
value: HIGH

Trust: 1.0

NVD: CVE-2022-24761
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-21483
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202203-1570
value: HIGH

Trust: 0.6

VULMON: CVE-2022-24761
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-24761
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-21483
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-24761
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-24761
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-21483 // VULMON: CVE-2022-24761 // JVNDB: JVNDB-2022-007193 // CNNVD: CNNVD-202203-1570 // NVD: CVE-2022-24761 // NVD: CVE-2022-24761

PROBLEMTYPE DATA

problemtype:CWE-444

Trust: 1.0

problemtype:HTTP Request Smuggling (CWE-444) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-007193 // NVD: CVE-2022-24761

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202203-1570

TYPE

environmental issue

Trust: 0.6

sources: CNNVD: CNNVD-202203-1570

PATCH

title:Patch for Waitress Environment Issue Vulnerability (CNVD-2022-21483)url:https://www.cnvd.org.cn/patchInfo/show/326861

Trust: 0.6

title:Waitress Remediation measures for environmental problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=187036

Trust: 0.6

title:Debian CVElist Bug Report Logs: waitress: CVE-2022-24761url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=61e11d4f66b6b048cc0d947d0c01c7ab

Trust: 0.1

title:Red Hat: Important: Red Hat OpenStack Platform 16.1 (python-waitress) security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221254 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-5138-1 waitress -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9fbb3649d8c456a79667847d6403831c

Trust: 0.1

title:Red Hat: Important: Red Hat OpenStack Platform 16.2 (python-waitress) security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221253 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenStack Platform 13.0 (python-waitress) security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221264 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.10.10 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221356 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-24761

Trust: 0.1

title:Amazon Linux 2022: ALAS-2022-235url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS-2022-235

Trust: 0.1

sources: CNVD: CNVD-2022-21483 // VULMON: CVE-2022-24761 // CNNVD: CNNVD-202203-1570

EXTERNAL IDS

db:NVDid:CVE-2022-24761

Trust: 4.5

db:JVNDBid:JVNDB-2022-007193

Trust: 0.8

db:PACKETSTORMid:166645

Trust: 0.7

db:PACKETSTORMid:166620

Trust: 0.7

db:PACKETSTORMid:166818

Trust: 0.7

db:PACKETSTORMid:169389

Trust: 0.7

db:CNVDid:CNVD-2022-21483

Trust: 0.6

db:AUSCERTid:ESB-2022.2351

Trust: 0.6

db:AUSCERTid:ESB-2022.1786

Trust: 0.6

db:AUSCERTid:ESB-2022.2434

Trust: 0.6

db:AUSCERTid:ESB-2022.1506

Trust: 0.6

db:CS-HELPid:SB2022042554

Trust: 0.6

db:CS-HELPid:SB2022051829

Trust: 0.6

db:CS-HELPid:SB2022040716

Trust: 0.6

db:CS-HELPid:SB2022032107

Trust: 0.6

db:CNNVDid:CNNVD-202203-1570

Trust: 0.6

db:VULMONid:CVE-2022-24761

Trust: 0.1

db:PACKETSTORMid:166594

Trust: 0.1

db:PACKETSTORMid:166605

Trust: 0.1

sources: CNVD: CNVD-2022-21483 // VULMON: CVE-2022-24761 // JVNDB: JVNDB-2022-007193 // PACKETSTORM: 166645 // PACKETSTORM: 166594 // PACKETSTORM: 166605 // PACKETSTORM: 166620 // PACKETSTORM: 166818 // PACKETSTORM: 169389 // CNNVD: CNNVD-202203-1570 // NVD: CVE-2022-24761

REFERENCES

url:https://www.debian.org/security/2022/dsa-5138

Trust: 2.6

url:https://github.com/pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0

Trust: 2.5

url:https://github.com/pylons/waitress/security/advisories/ghsa-4f7p-27jc-3c36

Trust: 2.5

url:https://github.com/pylons/waitress/releases/tag/v2.1.1

Trust: 2.5

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-24761

Trust: 2.0

url:https://access.redhat.com/security/cve/cve-2022-24761

Trust: 1.0

url:https://www.auscert.org.au/bulletins/esb-2022.1786

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051829

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042554

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-24761/

Trust: 0.6

url:https://packetstormsecurity.com/files/166645/red-hat-security-advisory-2022-1264-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166818/red-hat-security-advisory-2022-1356-01.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/waitress-read-write-access-via-http-request-smuggling-37968

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022040716

Trust: 0.6

url:https://packetstormsecurity.com/files/166620/red-hat-security-advisory-2022-1254-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169389/debian-security-advisory-5138-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2351

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032107

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1506

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2434

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/444.html

Trust: 0.2

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008013

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1264

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/waitress/1.4.1-1ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/waitress/1.4.4-1.1ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5364-1

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1253

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1254

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1356

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:1355

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/waitress

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

sources: CNVD: CNVD-2022-21483 // VULMON: CVE-2022-24761 // JVNDB: JVNDB-2022-007193 // PACKETSTORM: 166645 // PACKETSTORM: 166594 // PACKETSTORM: 166605 // PACKETSTORM: 166620 // PACKETSTORM: 166818 // PACKETSTORM: 169389 // CNNVD: CNNVD-202203-1570 // NVD: CVE-2022-24761

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 166645 // PACKETSTORM: 166605 // PACKETSTORM: 166620 // PACKETSTORM: 166818

SOURCES

db:CNVDid:CNVD-2022-21483
db:VULMONid:CVE-2022-24761
db:JVNDBid:JVNDB-2022-007193
db:PACKETSTORMid:166645
db:PACKETSTORMid:166594
db:PACKETSTORMid:166605
db:PACKETSTORMid:166620
db:PACKETSTORMid:166818
db:PACKETSTORMid:169389
db:CNNVDid:CNNVD-202203-1570
db:NVDid:CVE-2022-24761

LAST UPDATE DATE

2024-08-14T12:31:53.267000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-21483date:2022-03-22T00:00:00
db:VULMONid:CVE-2022-24761date:2022-09-23T00:00:00
db:JVNDBid:JVNDB-2022-007193date:2023-07-12T08:28:00
db:CNNVDid:CNNVD-202203-1570date:2022-12-09T00:00:00
db:NVDid:CVE-2022-24761date:2022-09-23T18:57:46.387

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-21483date:2022-03-22T00:00:00
db:VULMONid:CVE-2022-24761date:2022-03-17T00:00:00
db:JVNDBid:JVNDB-2022-007193date:2023-07-12T00:00:00
db:PACKETSTORMid:166645date:2022-04-08T15:06:24
db:PACKETSTORMid:166594date:2022-04-05T16:42:35
db:PACKETSTORMid:166605date:2022-04-06T16:24:55
db:PACKETSTORMid:166620date:2022-04-07T16:15:17
db:PACKETSTORMid:166818date:2022-04-22T14:13:53
db:PACKETSTORMid:169389date:2022-05-28T19:12:00
db:CNNVDid:CNNVD-202203-1570date:2022-03-17T00:00:00
db:NVDid:CVE-2022-24761date:2022-03-17T13:15:07.647