[ALSA-2023:6402] containernetworking-plugins security and bug fix update
containernetworking-plugins security and bug fix update
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
- golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
- net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
- golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
- golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
- golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
- golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
- golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
- golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
- golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
- golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/almalinux/containernetworking-plugins?arch=x86_64&distro=almalinux-9 | < 1.3.0-4.el9 |
pkg:rpm/almalinux/containernetworking-plugins?arch=aarch64&distro=almalinux-9 | < 1.3.0-4.el9 |
- ID
- ALSA-2023:6402
- Severity
- moderate
- URL
- https://errata.almalinux.org/ALSA-2023:6402.html
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-14T12:05:08
(10 months ago) - Rights
- Copyright 2023 AlmaLinux OS
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1760
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1881
- ALAS2-2023-2015
- ALAS2-2023-2037
- ALAS2-2023-2052
- ALAS2-2023-2143
- ALAS2-2023-2163
- ALAS2-2023-2185
- ALAS2-2023-2186
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2208
- ALAS2-2023-2238
- ALAS2-2023-2303
- ALPINE:CVE-2022-41723
- ALPINE:CVE-2022-41724
- ALPINE:CVE-2022-41725
- ALPINE:CVE-2023-24534
- ALPINE:CVE-2023-24536
- ALPINE:CVE-2023-24538
- ALPINE:CVE-2023-24539
- ALPINE:CVE-2023-24540
- ALPINE:CVE-2023-29400
- ALPINE:CVE-2023-29406
- ALSA-2023:3083
- ALSA-2023:3318
- ALSA-2023:3319
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6380
- ALSA-2023:6420
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ALSA-2023:7202
- ELSA-2023-3083
- ELSA-2023-3318
- ELSA-2023-3319
- ELSA-2023-6363
- ELSA-2023-6380
- ELSA-2023-6402
- ELSA-2023-6420
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- ELSA-2023-7202
- FEDORA-2023-28c182b657
- FEDORA-2023-327346caa5
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-8c02aee138
- FEDORA-2023-a5a5542890
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-e359fd31d2
- FREEBSD:02E51CB3-D7E4-11ED-9F7A-5404A68AD561
- FREEBSD:0B85B1CD-E468-11ED-834B-6C3BE5272ACD
- FREEBSD:348EE234-D541-11ED-AD86-A134A566F1E6
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:78F2E491-312D-11EE-85F2-BD89B893FCB4
- GLSA-202311-09
- GLSA-202408-07
- GO-2023-1569
- GO-2023-1570
- GO-2023-1571
- GO-2023-1703
- GO-2023-1704
- GO-2023-1705
- GO-2023-1751
- GO-2023-1752
- GO-2023-1753
- GO-2023-1878
- MS:CVE-2022-41723
- RHBA-2023:2181
- RHSA-2023:3083
- RHSA-2023:3318
- RHSA-2023:3319
- RHSA-2023:5721
- RHSA-2023:5738
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6380
- RHSA-2023:6402
- RHSA-2023:6420
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- RHSA-2023:7202
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:1791-1
- SUSE-SU-2023:1792-1
- SUSE-SU-2023:2105-1
- SUSE-SU-2023:2105-2
- SUSE-SU-2023:2127-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2023:2845-1
- SUSE-SU-2023:2846-1
- SUSE-SU-2023:3002-1
- SUSE-SU-2023:3841-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:3288-1
- USN-6038-1
- USN-6038-2
- USN-6140-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/almalinux/containernetworking-plugins?arch=x86_64&distro=almalinux-9 | almalinux | containernetworking-plugins | < 1.3.0-4.el9 | almalinux-9 | x86_64 | |
Affected | pkg:rpm/almalinux/containernetworking-plugins?arch=aarch64&distro=almalinux-9 | almalinux | containernetworking-plugins | < 1.3.0-4.el9 | almalinux-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |