QID 241505

Date Published: 2023-05-18

QID 241505: Red Hat Update for container-tools:rhel8 security (RHSA-2023:2758)

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc...Security Fix(es):

    golang: net/http: improper sanitization of transfer-encoding header (cve-2022-1705).
    Golang: go/parser: stack exhaustion in all parse* functions (cve-2022-1962).
    Golang: net/http: handle server errors after sending goaway (cve-2022-27664).
    Golang: encoding/xml: stack exhaustion in decoder.
    Skip (cve-2022-28131).
    Golang: io/fs: stack exhaustion in glob (cve-2022-30630).
    Golang: compress/gzip: stack exhaustion in reader.
    Read (cve-2022-30631).
    Golang: path/filepath: stack exhaustion in glob (cve-2022-30632).
    Golang: encoding/xml: stack exhaustion in unmarshal (cve-2022-30633).
    Golang: encoding/gob: stack exhaustion in decoder.
    Decode (cve-2022-30635).
    Golang: net/http/httputil: newsinglehostreverseproxy - omit x-forwarded-for not working (cve-2022-32148).
    Golang: net/http: excessive memory growth in a go server accepting http/2 requests (cve-2022-41717).
    Podman: symlink exchange attack in podman export volume (cve-2023-0778).
    Golang: crypto/tls: session tickets lack random ticket_age_add (cve-2022-30629).
    Golang: math/big: decoding big.
    Float and big.
    Rat types can panic if the encoded message is too short, potentially allowing a denial of service (cve-2022-32189).
<H2></H2>
    Red Hat enterprise linux for x86_64 8 x86_64.
    Red hat enterprise linux for ibm z systems 8 s390x.
    Red hat enterprise linux for power, little endian 8 ppc64le.
    Red hat enterprise linux for arm 64 8 aarch64.
.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2023:2758 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2023:2758 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2023:2758