Upstream information
Description
Inadequate Encryption Strength vulnerability in Apache Answer.This issue affects Apache Answer: through 1.4.0.
The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable.
Users are recommended to upgrade to version 1.4.1, which fixes the issue.
SUSE information
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
CNA (CISA-ADP) | |
---|---|
Base Score | 2.6 |
Vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | High |
User Interaction | Required |
Scope | Changed |
Confidentiality Impact | Low |
Integrity Impact | None |
Availability Impact | None |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2024:14567-1, published Thu Dec 12 18:51:05 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
Container suse/sl-micro/6.0/baremetal-os-container:2.1.3-4.27 |
| |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-14567 |
SUSE Timeline for this CVE
CVE page created: Fri Nov 22 18:00:02 2024CVE page last modified: Fri Dec 13 12:04:59 2024