Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:6309

Опубликовано: 07 мая 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: fence-agents security update

The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.

Security Fix(es):

  • urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)

  • pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
fence-agents-cisco-ucsnoarch129.el8_10.4fence-agents-cisco-ucs-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-allx86_64129.el8_10.4fence-agents-all-4.2.1-129.el8_10.4.x86_64.rpm
fence-agents-amt-wsnoarch129.el8_10.4fence-agents-amt-ws-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-apcnoarch129.el8_10.4fence-agents-apc-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-apc-snmpnoarch129.el8_10.4fence-agents-apc-snmp-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-bladecenternoarch129.el8_10.4fence-agents-bladecenter-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-brocadenoarch129.el8_10.4fence-agents-brocade-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-cisco-mdsnoarch129.el8_10.4fence-agents-cisco-mds-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-commonnoarch129.el8_10.4fence-agents-common-4.2.1-129.el8_10.4.noarch.rpm
fence-agents-computenoarch129.el8_10.4fence-agents-compute-4.2.1-129.el8_10.4.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
10 месяцев назад

ELSA-2024-6311: resource-agents security update (MODERATE)

oracle-oval
10 месяцев назад

ELSA-2024-6309: fence-agents security update (MODERATE)

CVSS3: 4.4
ubuntu
около 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
redhat
около 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
nvd
около 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable auto