QID 242458

Date Published: 2023-11-16

QID 242458: Red Hat Update for container-tools:4.0 (RHSA-2023:6938)

the container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc...Security Fix(es):

    go-yaml: improve heuristics preventing cpu/memory abuse by parsing malicious or large yaml documents (cve-2022-3064).
    golang: html/template: improper handling of javascript whitespace (cve-2023-24540).
    net/http, golang.org/x/net/http2: avoid quadratic complexity in hpack decoding (cve-2022-41723).
    golang: crypto/tls: large handshake records may cause panics (cve-2022-41724).
    golang: net/http, mime/multipart: denial of service from excessive resource consumption (cve-2022-41725).
    golang.org/x/net/html: cross site scripting (cve-2023-3978).
    golang: net/http, net/textproto: denial of service from excessive memory allocation (cve-2023-24534).
    golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (cve-2023-24536).
    golang: go/parser: infinite loop in parsing (cve-2023-24537).
    golang: html/template: backticks not treated as string delimiters (cve-2023-24538).
    golang: html/template: improper sanitization of css values (cve-2023-24539).
    runc: rootless runc makes `/sys/fs/cgroup` writable (cve-2023-25809).
    runc: volume mount race condition (regression of cve-2019-19921) (cve-2023-27561).
    runc: apparmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration (cve-2023-28642).
    golang: html/template: improper handling of empty html attributes (cve-2023-29400).
    Red hat enterprise linux for ibm z systems 8 s390x.
    Red hat enterprise linux for power, little endian 8 ppc64le.
    Red hat enterprise linux for arm 64 8 aarch64.
.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2023:6938 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2023:6938 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2023:6938