QID 242882
Date Published: 2024-02-07
QID 242882: Red Hat Update for container-tools:4.0 (RHSA-2024:0121)
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc...Security Fix(es):
- golang: archive/tar: unbounded memory consumption when reading headers (cve-2022-2879).
Golang: net/http/httputil: reverseproxy should not forward unparseable query parameters (cve-2022-2880).
Golang: net/http: handle server errors after sending goaway (cve-2022-27664).
Golang: regexp/syntax: limit memory used by parsing regexps (cve-2022-41715).
Golang: crypto/tls: slow verification of certificate chains containing large rsa keys (cve-2023-29409).
Golang: html/template: improper handling of html-like comments within script contexts (cve-2023-39318).
Golang: html/template: improper handling of special tags within script contexts (cve-2023-39319).
Golang: crypto/tls: panic when processing post-handshake message on quic connections (cve-2023-39321).
Golang: crypto/tls: lack of a limit on buffered post-handshake (cve-2023-39322).
- Red Hat enterprise linux for x86_64 8 x86_64.
Red hat enterprise linux for ibm z systems 8 s390x.
Red hat enterprise linux for power, little endian 8 ppc64le.
Red hat enterprise linux for arm 64 8 aarch64.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Red Hat security advisory RHSA-2024:0121 for updates and patch information.
Vendor References
- RHSA-2024:0121 -
access.redhat.com/errata/RHSA-2024:0121
CVEs related to QID 242882
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2024:0121 | Red Hat Enterprise Linux |
|