Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0420-1

Опубликовано: 11 фев. 2025
Источник: suse-cvrf

Описание

Security update for skopeo

This update for skopeo fixes the following issues:

  • CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing them to log files. (bsc#1227056)
  • CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236483)

Список пакетов

SUSE Linux Enterprise Micro 5.5
skopeo-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6
skopeo-1.14.4-150300.11.16.1
skopeo-bash-completion-1.14.4-150300.11.16.1
skopeo-zsh-completion-1.14.4-150300.11.16.1
openSUSE Leap 15.6
skopeo-1.14.4-150300.11.16.1
skopeo-bash-completion-1.14.4-150300.11.16.1
skopeo-fish-completion-1.14.4-150300.11.16.1
skopeo-zsh-completion-1.14.4-150300.11.16.1

Описание

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.


Затронутые продукты
SUSE Linux Enterprise Micro 5.5:skopeo-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-bash-completion-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-zsh-completion-1.14.4-150300.11.16.1

Ссылки

Описание

go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.


Затронутые продукты
SUSE Linux Enterprise Micro 5.5:skopeo-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-bash-completion-1.14.4-150300.11.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:skopeo-zsh-completion-1.14.4-150300.11.16.1

Ссылки
Уязвимость SUSE-SU-2025:0420-1