Red Hat Security Advisory 2024-9485-03
The following advisory data is extracted from:
https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9485.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat’s archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
– Packet Storm Staff
====================================================================
Red Hat Security Advisory
Synopsis: Important: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update
Advisory ID: RHSA-2024:9485-03
Product: Red Hat OpenStack Services on OpenShift
Advisory URL: https://access.redhat.com/errata/RHSA-2024:9485
Issue date: 2024-11-13
Revision: 03
CVE Names: CVE-2023-45289
====================================================================
Summary:
Control plane Operators for RHOSO 18.0.3 (Feature Release 1).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
Security fix(es):
* Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. (CVE-2024-34156)
* When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \”Authorization\” or \”Cookie\”. For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. (CVE-2023-45289)
* When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. (CVE-2023-45290)
* Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. (CVE-2024-24783)
* The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. (CVE-2024-24784)
* If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the
html/template package, allowing for subsequent actions to inject unexpected content into templates. (CVE-2024-24785)
* A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. (CVE-2024-24788)
* Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. (CVE-2024-34155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Solution:
CVEs:
CVE-2023-45289
References:
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2268017
https://bugzilla.redhat.com/show_bug.cgi?id=2268018
https://bugzilla.redhat.com/show_bug.cgi?id=2268019
https://bugzilla.redhat.com/show_bug.cgi?id=2268021
https://bugzilla.redhat.com/show_bug.cgi?id=2268022
https://bugzilla.redhat.com/show_bug.cgi?id=2279814
https://bugzilla.redhat.com/show_bug.cgi?id=2310527
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://issues.redhat.com/browse/OSPRH-10035
https://issues.redhat.com/browse/OSPRH-10040
https://issues.redhat.com/browse/OSPRH-10090
https://issues.redhat.com/browse/OSPRH-10141
https://issues.redhat.com/browse/OSPRH-10195
https://issues.redhat.com/browse/OSPRH-10282
https://issues.redhat.com/browse/OSPRH-10288
https://issues.redhat.com/browse/OSPRH-10411
https://issues.redhat.com/browse/OSPRH-105
https://issues.redhat.com/browse/OSPRH-10612
https://issues.redhat.com/browse/OSPRH-10639
https://issues.redhat.com/browse/OSPRH-10725
https://issues.redhat.com/browse/OSPRH-1099
https://issues.redhat.com/browse/OSPRH-11068
https://issues.redhat.com/browse/OSPRH-1478
https://issues.redhat.com/browse/OSPRH-2428
https://issues.redhat.com/browse/OSPRH-3466
https://issues.redhat.com/browse/OSPRH-3467
https://issues.redhat.com/browse/OSPRH-4128
https://issues.redhat.com/browse/OSPRH-6501
https://issues.redhat.com/browse/OSPRH-6624
https://issues.redhat.com/browse/OSPRH-6720
https://issues.redhat.com/browse/OSPRH-6951
https://issues.redhat.com/browse/OSPRH-7324
https://issues.redhat.com/browse/OSPRH-7610
https://issues.redhat.com/browse/OSPRH-7817
https://issues.redhat.com/browse/OSPRH-7821
https://issues.redhat.com/browse/OSPRH-8038
https://issues.redhat.com/browse/OSPRH-8058
https://issues.redhat.com/browse/OSPRH-8065
https://issues.redhat.com/browse/OSPRH-8069
https://issues.redhat.com/browse/OSPRH-8072
https://issues.redhat.com/browse/OSPRH-8074
https://issues.redhat.com/browse/OSPRH-8078
https://issues.redhat.com/browse/OSPRH-8118
https://issues.redhat.com/browse/OSPRH-8192
https://issues.redhat.com/browse/OSPRH-8193
https://issues.redhat.com/browse/OSPRH-8195
https://issues.redhat.com/browse/OSPRH-8212
https://issues.redhat.com/browse/OSPRH-8290
https://issues.redhat.com/browse/OSPRH-8508
https://issues.redhat.com/browse/OSPRH-8535
https://issues.redhat.com/browse/OSPRH-8582
https://issues.redhat.com/browse/OSPRH-9285
https://issues.redhat.com/browse/OSPRH-9371
https://issues.redhat.com/browse/OSPRH-9411
https://issues.redhat.com/browse/OSPRH-9455
https://issues.redhat.com/browse/OSPRH-9908
https://issues.redhat.com/browse/OSPRH-9910
https://issues.redhat.com/browse/OSPRH-9991