Upstream information
Description
Boundary Community Edition and Boundary Enterprise ("Boundary") incorrectly handle HTTP requests during the initialization of the Boundary controller, which may cause the Boundary server to terminate prematurely. Boundary is only vulnerable to this flaw during the initialization of the Boundary controller, which on average is measured in milliseconds during the Boundary startup process.This vulnerability, CVE-2024-12289, is fixed in Boundary Community Edition and Boundary Enterprise 0.16.4, 0.17.3, 0.18.2.
SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CNA (HashiCorp) | |
---|---|
Base Score | 5.9 |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | High |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2024:14603-1, published Fri Dec 20 18:51:47 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-14603 |
SUSE Timeline for this CVE
CVE page created: Fri Dec 13 02:02:05 2024CVE page last modified: Fri Dec 20 19:51:33 2024