drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Request Forgery in Red Hat build of Cryostat
| Name: |
Cross-Site Request Forgery in Red Hat build of Cryostat |
|
| ID: |
RHSA-2025:3018 |
|
| Distribution: |
Red Hat |
|
| Plattformen: |
Red Hat Cryostat 4 on RHEL 9 |
|
| Datum: |
Do, 20. März 2025, 07:52 |
|
| Referenzen: |
https://access.redhat.com/security/cve/CVE-2024-12397
https://access.redhat.com/errata/RHSA-2025:3018
https://bugzilla.redhat.com/show_bug.cgi?id=2331298 |
|
| Applikationen: |
Red Hat build of Cryostat |
|
Originalnachricht |
New Red Hat build of Cryostat 4.0.0 on RHEL 9 container images are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
New Red Hat build of Cryostat 4.0.0 on RHEL 9 container images have been released, adding a variety of features and bug fixes.
Users of the Red Hat build of Cryostat 3.0.1 on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.
Security Fix(es):
* io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling (CVE-2024-12397)
You can find images updated by this advisory in the Red Hat Container Catalog (see the References section).
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2024-12397: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') (CWE-444)
|
|
|
|