Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8697-479h-5mfp: Weaviate denial of service vulnerability

Impact

This vulnerability is a type conversion issue that affects users of Weaviate Server versions 1.20.0 and earlier. Who is impacted: Users of Weaviate Server versions 1.20.0 and earlier are impacted by this vulnerability.

Patches

A patch has been developed for this vulnerability. Patch releases 1.20.6, 1.19.13, and 1.18.6 are fixing this vulnerability in each respective minor version release. Users are strongly recommended to upgrade to one of these patched versions to address the vulnerability. Keeping software up-to-date is crucial to avoid security vulnerabilities.

Workarounds

There are no known workarounds to fix or remediate this vulnerability without upgrading. Users must upgrade to a patched version to mitigate the risk.

References

  • https://github.com/weaviate/weaviate/releases/tag/v1.18.6
  • https://github.com/weaviate/weaviate/releases/tag/v1.19.13
  • https://github.com/weaviate/weaviate/releases/tag/v1.20.6
ghsa
#vulnerability#dos#git

Package

gomod github.com/weaviate/weaviate (Go)

Affected versions

>= 1.20.0, < 1.20.6

>= 1.19.0, < 1.19.13

< 1.18.6

Patched versions

1.20.6

1.19.13

1.18.6

Description

Impact

This vulnerability is a type conversion issue that affects users of Weaviate Server versions 1.20.0 and earlier.
Who is impacted: Users of Weaviate Server versions 1.20.0 and earlier are impacted by this vulnerability.

Patches

A patch has been developed for this vulnerability.
Patch releases 1.20.6, 1.19.13, and 1.18.6 are fixing this vulnerability in each respective minor version release.
Users are strongly recommended to upgrade to one of these patched versions to address the vulnerability.
Keeping software up-to-date is crucial to avoid security vulnerabilities.

Workarounds

There are no known workarounds to fix or remediate this vulnerability without upgrading.
Users must upgrade to a patched version to mitigate the risk.

References

  • https://github.com/weaviate/weaviate/releases/tag/v1.18.6
  • https://github.com/weaviate/weaviate/releases/tag/v1.19.13
  • https://github.com/weaviate/weaviate/releases/tag/v1.20.6

References

  • GHSA-8697-479h-5mfp
  • https://nvd.nist.gov/vuln/detail/CVE-2023-38976
  • weaviate/weaviate#3258
  • weaviate/weaviate#3431
  • weaviate/weaviate@2a7b208
  • https://github.com/weaviate/weaviate/releases/tag/v1.18.6
  • https://github.com/weaviate/weaviate/releases/tag/v1.19.13
  • https://github.com/weaviate/weaviate/releases/tag/v1.20.6

aduis published to weaviate/weaviate

Aug 22, 2023

Published to the GitHub Advisory Database

Aug 22, 2023

Reviewed

Aug 22, 2023

Last updated

Aug 22, 2023

Related news

GHSA-ch6w-mc6c-g65g: weaviate denial of service vulnerability

An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the `handleUnbatchedGraphQLRequest` function.

CVE-2023-38976: panic when type assertions in function handleUnbatchedGraphQLRequest · Issue #3258 · weaviate/weaviate

An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.