DirectorySecurity Advisories
Sign In
Security Advisories

CGA-jq79-r8v3-w5hp

Published

Last updated

https://images.chainguard.dev/security/CGA-jq79-r8v3-w5hp
Package

logstash-jre-bcfips

Latest Update
Fixed
Fixed Version

8.15.1-r0

Aliases
  • CVE-2024-43380
  • GHSA-2m96-52r3-2f3g

Severity

5.3

Medium

CVSS V3

Summary

fugit parse and parse_nat stall on lengthy input

Description

Impact

The fugit "natural" parser, that turns "every wednesday at 5pm" into "0 17 * * 3", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight.

Fugit dependents that do not check (user) input length for plausability are impacted.

Patches

Problem was reported in #104 and the fix was released in fugit 1.11.1

Workarounds

By making sure that Fugit.parse(s), Fugit.do_parse(s), Fugit.parse_nat(s), Fugit.do_parse_nat(s), Fugit::Nat.parse(s), and Fugit::Nat.do_parse(s) are not fed strings too long. 1000 chars feels ok, while 10_000 chars makes it stall.

In fewer words, making sure those fugit methods are not fed unvetted input strings.

References

gh-104

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images