Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN267

_____________________________________________________________________

DATE                : 29/04/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware Tanzu Greenplum versions
                                     prior to 7.4.1,
                      VMware Tanzu Gemfire running Apache Lucene
                             versions prior to 9.12,
                     Systems running OSS RabbitMQ 4.0.3,
                     Tanzu RabbitMQ 4.0.3 & LTS OSS RabbitMQ 3.13.8.

=====================================================================
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25664
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25665
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25663
_____________________________________________________________________

Product Release Advisory - VMware Tanzu Greenplum 7.4.1
Product/Component

VMware Tanzu Greenplum

Notification Id
25664

Last Updated
28 April 2025

Initial Publication Date
28 April 2025

Status
CLOSED

Severity
CRITICAL

CVSS Base Score
9.1

WorkAround

Affected CVE

See advisory details
Security Advisory

Advisory ID:
TNZ-2025-0023

Severity:
Critical

Issue Date:
2025-04-28 

Updated on:

Synopsis
	

Bumped multiple dependencies which resulted in 7 CVEs remediated
in this release.


Product Version Release Advisory

    VMware Tanzu Greenplum 7.4.1
    https://techdocs.broadcom.com/us/en/vmware-tanzu/data-solutions/tanzu-greenplum/7/greenplum-database/relnotes-release-notes.html#rel_741 

Security Fixes

This release has the following security fixes, listed by
component and area.

Component                Vulnerabilities Resolved

Greenplum Server               CVE-2025-1094 (high)
                               CVE-2023-5868 (medium)

Greenplum Cluster Management   CVE-2024-45337 (critical)
                               CVE-2023-45288 (medium)
                               CVE-2024-45338 (medium)
                               CVE-2024-24786 (medium)

Greenplum Virtual              CVE-2025-30204 (medium)


History

2025-04-28: Initial vulnerability report published.


Contact

E-mail: tanzu.psirt@broadcom.com

VMware Tanzu Security Advisories
https://tanzu.vmware.com/security

_____________________________________________________________________

Product Release Advisory -VMware Tanzu Gemfire 1.2.0
Product/Component

VMware Tanzu Gemfire


Notification Id
25665

Last Updated
28 April 2025

Initial Publication Date
28 April 2025

Status
CLOSED

Severity
HIGH

CVSS Base Score
8.0

WorkAround

Affected CVE
CVE-2024-45772


Product Release Advisory

Advisory ID:    TNZ-2025-0024

Severity:      High

Issue Date:    2025-04-28

Updated on:    2025-04-28

Synopsis
	

Updated Apache Lucene from 9.10 to 9.12 to remediate
CVE-2024-45772


Product Version Release Advisory

    VMware Tanzu GemFire Vector Database 1.2.0
    https://techdocs.broadcom.com/us/en/vmware-tanzu/data-solutions/tanzu-gemfire-vector-database/1-2/gf-vector-db/release_notes.html


Security Fixes

This release has the following security fixes, listed by component and area.

Component               Vulnerabilities Resolved

Apache Lucene           CVE-2024-45772 (high)
History

2025-04-28: Initial vulnerability report published.


Contact

E-mail: tanzu.psirt@broadcom.com

VMware Tanzu Security Advisories
https://support.broadcom.com/group/ecx/security-advisory?segment=VT 

_____________________________________________________________________

Tanzu RabbitMQ Security Advisory CVE-2025-30219 - TNZ-2025-0022
Product/Component

VMware Tanzu RabbitMQ

Notification Id
25663

Last Updated
28 April 2025

Initial Publication Date
28 April 2025

Status
CLOSED

Severity
MEDIUM

CVSS Base Score
6.1

WorkAround

Affected CVE
CVE-2025-30219

Individual Advisory

Advisory ID:       TNZ-2025-0022

Severity:          Medium

CVSSv3 Range:      4.0-6.9

CVSSv3 Vector:     6.1

Issue Date:        2025-04-28 

Updated on:        2025-04-28

CVE(s)             CVE-2025-30219

Synopsis
	

Versions prior to 4.0.3 are vulnerable to a sophisticated attack
that could modify virtual host name on disk and then make it
unrecoverable (with other on disk file modifications) can lead
to arbitrary JavaScript code execution in the browsers of
management UI users. When a virtual host on a RabbitMQ node
fails to start, recent versions will display an error message
(a notification) in the management UI. The error message
includes virtual host name, which was not escaped prior to open
source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An
attack that both makes a virtual host fail to start and creates
a new virtual host name with an XSS code snippet or changes the
name of an existing virtual host on disk could trigger
arbitrary JavaScript code execution in the management UI (the
user's browser). Open source RabbitMQ `4.0.3` and Tanzu
RabbitMQ `4.0.3` and `3.13.8` patch the issue.


Product Versions Affected

    OSS RabbitMQ 4.0.3
    Tanzu RabbitMQ 4.0.3 & LTS OSS RabbitMQ 3.13.8


Upstream OSS Advisory Link:

https://nvd.nist.gov/vuln/detail/CVE-2025-30219

https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-g58g-82mw-9m3p


Other Products Versions Affected

    None


Mitigation

Users of affected versions should apply the following mitigation
or upgrade:

    Users are advised to disable the management plugin and use
Prometheus and Grafana for monitoring


History

2025-04-28: Initial vulnerability report published.


Contact

E-mail: tanzu.psirt@broadcom.com

VMware Tanzu Security Advisories
https://tanzu.vmware.com/security


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
