Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:2988

Опубликовано: 07 мая 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: container-tools:rhel8 security update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect (CVE-2018-25091)

  • golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)

  • golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)

  • golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)

  • golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)

  • golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)

  • golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)

  • golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)

  • golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)

  • golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)

  • golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

  • golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)

  • golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

  • urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)

  • ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)

  • moby/buildkit: Possible race condition with accessing subpaths from cache mounts (CVE-2024-23650)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
aardvark-dnsx86_641.module+el8.10.0+1815+5fe7415eaardvark-dns-1.10.0-1.module+el8.10.0+1815+5fe7415e.x86_64.rpm
aardvark-dnsx86_641.module+el8.10.0+1872+2e18eb19aardvark-dns-1.10.0-1.module+el8.10.0+1872+2e18eb19.x86_64.rpm
aardvark-dnsx86_641.module+el8.10.0+1843+6892ab28aardvark-dns-1.10.0-1.module+el8.10.0+1843+6892ab28.x86_64.rpm
aardvark-dnsx86_641.module+el8.10.0+1825+623b0c20aardvark-dns-1.10.0-1.module+el8.10.0+1825+623b0c20.x86_64.rpm
cockpit-podmannoarch1.module+el8.10.0+1880+8e896d1bcockpit-podman-84.1-1.module+el8.10.0+1880+8e896d1b.noarch.rpm
cockpit-podmannoarch1.module+el8.10.0+1874+ce489889cockpit-podman-84.1-1.module+el8.10.0+1874+ce489889.noarch.rpm
cockpit-podmannoarch1.module+el8.10.0+1872+2e18eb19cockpit-podman-84.1-1.module+el8.10.0+1872+2e18eb19.noarch.rpm
cockpit-podmannoarch1.module+el8.10.0+1843+6892ab28cockpit-podman-84.1-1.module+el8.10.0+1843+6892ab28.noarch.rpm
cockpit-podmannoarch1.module+el8.10.0+1825+623b0c20cockpit-podman-84.1-1.module+el8.10.0+1825+623b0c20.noarch.rpm
cockpit-podmannoarch1.module+el8.10.0+1815+5fe7415ecockpit-podman-84.1-1.module+el8.10.0+1815+5fe7415e.noarch.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

CVSS3: 6.1
ubuntu
около 2 лет назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

CVSS3: 6.1
redhat
около 2 лет назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

CVSS3: 6.1
nvd
около 2 лет назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

msrc
3 месяца назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).