Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Red Hat Security Advisory 2022-6820-01[6]
- Authored by Red Hat[7] | Site access.redhat.com[8]
-
Red Hat Security Advisory 2022-6820-01 - Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Issues addressed include a denial of service vulnerability.
- systems | linux[9], redhat[10]
- advisories | CVE-2022-25857[11]
- SHA-256 |
606e7ef9a54b678919985503c7b7e45e37c281f511849e2c1aef24734c18fa81
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: prometheus-jmx-exporter security update
Advisory ID: RHSA-2022:6820-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6820
Issue date: 2022-10-06
CVE Names: CVE-2022-25857
====================================================================
1. Summary:
An update for prometheus-jmx-exporter is now available for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - noarch
3. Description:
Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that
can be configured to scrape and expose MBeans of a JMX target.
Security Fix(es):
* snakeyaml: Denial of Service due to missing nested depth limitation for
collections (CVE-2022-25857)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source:
prometheus-jmx-exporter-0.12.0-8.el8_6.src.rpm
noarch:
prometheus-jmx-exporter-0.12.0-8.el8_6.noarch.rpm
prometheus-jmx-exporter-openjdk11-0.12.0-8.el8_6.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-25857
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/cve/CVE-2022-25857
8. Contact:
The Red Hat security contact is <Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser. >. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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½j1
-----END PGP SIGNATURE-----
--
RHSA-announce mailing listCette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://listman.redhat.com/mailman/listinfo/rhsa-announce
File Tags
- ActiveX[21] (932)
- Advisory[22] (78,336)
- Arbitrary[23] (15,297)
- BBS[24] (2,859)
- Bypass[25] (1,599)
- CGI[26] (1,013)
- Code Execution[27] (6,786)
- Conference[28] (671)
- Cracker[29] (840)
- CSRF[30] (3,277)
- DoS[31] (22,092)
- Encryption[32] (2,341)
- Exploit[33] (50,173)
- File Inclusion[34] (4,160)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,565)
- Intrusion Detection[38] (862)
- Java[39] (2,829)
- JavaScript[40] (808)
- Kernel[41] (6,166)
- Local[42] (14,103)
- Magazine[43] (586)
- Overflow[44] (12,254)
- Perl[45] (1,413)
- PHP[46] (5,059)
- Proof of Concept[47] (2,284)
- Protocol[48] (3,366)
- Python[49] (1,409)
- Remote[50] (29,885)
- Root[51] (3,468)
- Ruby[52] (581)
- Scanner[53] (1,631)
- Security Tool[54] (7,744)
- Shell[55] (3,079)
- Shellcode[56] (1,204)
- Sniffer[57] (884)
- Spoof[58] (2,123)
- SQL Injection[59] (16,066)
- TCP[60] (2,370)
- Trojan[61] (682)
- UDP[62] (873)
- Virus[63] (660)
- Vulnerability[64] (30,677)
- Web[65] (9,123)
- Whitepaper[66] (3,723)
- x86[67] (944)
- XSS[68] (17,420)
- Other[69]
File Archives
- October 2022[70]
- September 2022[71]
- August 2022[72]
- July 2022[73]
- June 2022[74]
- May 2022[75]
- April 2022[76]
- March 2022[77]
- February 2022[78]
- January 2022[79]
- December 2021[80]
- November 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,899)
- BSD[85] (369)
- CentOS[86] (55)
- Cisco[87] (1,915)
- Debian[88] (5,948)
- Fedora[89] (1,690)
- FreeBSD[90] (1,242)
- Gentoo[91] (4,219)
- HPUX[92] (878)
- iOS[93] (323)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (42,987)
- Mac OS X[98] (684)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (479)
- RedHat[102] (12,038)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (8,046)
- UNIX[107] (9,122)
- UnixWare[108] (185)
- Windows[109] (6,477)
- Other[110]
Read more https://packetstormsecurity.com/files/168651/RHSA-2022-6820-01.txt