The following advisory data is extracted from: https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7669.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat build of Cryostat 2.4.0: new RHEL 8 container images Advisory ID: RHSA-2023:7669-03 Product: Cryostat Advisory URL: https://access.redhat.com/errata/RHSA-2023:7669 Issue date: 2023-12-07 Revision: 03 CVE Names: CVE-2023-24815 ==================================================================== Summary: New Red Hat build of Cryostat 2.4.0 on RHEL 8 container images are now available Description: New Red Hat build of Cryostat 2.4.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Users of the Red Hat build of Cryostat 2.3.1 on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images. Security Fix(es): * vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route (CVE-2023-24815) * bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201) * netty: SniHandler 16MB allocation leads to OOM (CVE-2023-34462) You can find images updated by this advisory in Red Hat Container Catalog (see References). Solution: https://access.redhat.com/articles/11258 CVEs: CVE-2023-24815 References: https://access.redhat.com/security/updates/classification/#moderate https://bugzilla.redhat.com/show_bug.cgi?id=2209400 https://bugzilla.redhat.com/show_bug.cgi?id=2215465 https://bugzilla.redhat.com/show_bug.cgi?id=2216888 https://issues.redhat.com/browse/JAVAMON-236 https://issues.redhat.com/browse/JAVAMON-241 https://issues.redhat.com/browse/JAVAMON-243 https://issues.redhat.com/browse/JAVAMON-313 https://issues.redhat.com/browse/JAVAMON-319