CVE-2024-4323 Affecting fluent-bit-3.0 package, versions <3.0.4-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
74.85% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-FLUENTBIT30-6966888
  • published21 May 2024
  • disclosed20 May 2024

Introduced: 20 May 2024

CVE-2024-4323  (opens in a new tab)

How to fix?

Upgrade Chainguard fluent-bit-3.0 to version 3.0.4-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fluent-bit-3.0 package and not the fluent-bit-3.0 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.