{"id":"RHSA-2023:1486","summary":"Red Hat Security Advisory: Red Hat Gluster Storage web-admin-build security update","modified":"2026-04-02T10:03:14Z","published":"2024-09-30T14:42:50Z","upstream":["CVE-2022-24790","CVE-2022-30122","CVE-2022-30123","CVE-2022-31129","CVE-2022-31163"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:1486"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2071616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099524"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2105075"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110551"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1486.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24790"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24790"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24790"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30122"},{"type":"ARTICLE","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30122.yml"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30123"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30123"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-wq4h-7r42-5hrr"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31129"},{"type":"ARTICLE","url":"https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31163"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31163"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31163"},{"type":"ARTICLE","url":"https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx"}],"affected":[{"package":{"name":"rubygem-puma","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-puma"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.12-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-puma-debuginfo","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-puma-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.12-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-puma-doc","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-puma-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.12-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-rack","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-rack"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.4-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-rack-doc","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-rack-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.4-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"grafana","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/grafana"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.4-6.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-tzinfo","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-tzinfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.10-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}},{"package":{"name":"rubygem-tzinfo-doc","ecosystem":"Red Hat:storage:3.5:wa:el7","purl":"pkg:rpm/redhat/rubygem-tzinfo-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.10-1.el7rhgs"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1486.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}