Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:9058

Опубликовано: 15 дек. 2022
Источник: rocky
Оценка: Important

Описание

Important: prometheus-jmx-exporter security update

Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.

Security Fix(es):

  • SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
prometheus-jmx-exporternoarch9.el8_7prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpm
prometheus-jmx-exporter-openjdk11noarch9.el8_7prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpm
prometheus-jmx-exporter-openjdk17noarch9.el8_7prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpm
prometheus-jmx-exporter-openjdk8noarch9.el8_7prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 9.8
redhat
почти 3 года назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
nvd
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
debian
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be i ...

CVSS3: 8.3
github
больше 2 лет назад

SnakeYaml Constructor Deserialization Remote Code Execution