Описание
Moderate: container-tools:rhel8 security update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
-
urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect (CVE-2018-25091)
-
golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
-
golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
-
golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
-
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
-
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
-
golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)
-
golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)
-
golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)
-
golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)
-
golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)
-
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
-
golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
-
urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
-
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
-
moby/buildkit: Possible race condition with accessing subpaths from cache mounts (CVE-2024-23650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Ссылки на источники
Исправления
- Red Hat - 1983596
- Red Hat - 1989575
- Red Hat - 2132867
- Red Hat - 2132868
- Red Hat - 2132872
- Red Hat - 2228743
- Red Hat - 2237773
- Red Hat - 2237776
- Red Hat - 2237777
- Red Hat - 2237778
- Red Hat - 2244340
- Red Hat - 2246840
- Red Hat - 2253193
- Red Hat - 2253330
- Red Hat - 2254210
- Red Hat - 2262272
Связанные уязвимости
ELSA-2024-2988: container-tools:ol8 security update (MODERATE)
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).