The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9485.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update Advisory ID: RHSA-2024:9485-03 Product: Red Hat OpenStack Services on OpenShift Advisory URL: https://access.redhat.com/errata/RHSA-2024:9485 Issue date: 2024-11-13 Revision: 03 CVE Names: CVE-2023-45289 ==================================================================== Summary: Control plane Operators for RHOSO 18.0.3 (Feature Release 1). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Description: Security fix(es): * Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. (CVE-2024-34156) * When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. (CVE-2023-45289) * When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. (CVE-2023-45290) * Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. (CVE-2024-24783) * The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. (CVE-2024-24784) * If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates. (CVE-2024-24785) * A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. (CVE-2024-24788) * Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. (CVE-2024-34155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Solution: CVEs: CVE-2023-45289 References: https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=2268017 https://bugzilla.redhat.com/show_bug.cgi?id=2268018 https://bugzilla.redhat.com/show_bug.cgi?id=2268019 https://bugzilla.redhat.com/show_bug.cgi?id=2268021 https://bugzilla.redhat.com/show_bug.cgi?id=2268022 https://bugzilla.redhat.com/show_bug.cgi?id=2279814 https://bugzilla.redhat.com/show_bug.cgi?id=2310527 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://issues.redhat.com/browse/OSPRH-10035 https://issues.redhat.com/browse/OSPRH-10040 https://issues.redhat.com/browse/OSPRH-10090 https://issues.redhat.com/browse/OSPRH-10141 https://issues.redhat.com/browse/OSPRH-10195 https://issues.redhat.com/browse/OSPRH-10282 https://issues.redhat.com/browse/OSPRH-10288 https://issues.redhat.com/browse/OSPRH-10411 https://issues.redhat.com/browse/OSPRH-105 https://issues.redhat.com/browse/OSPRH-10612 https://issues.redhat.com/browse/OSPRH-10639 https://issues.redhat.com/browse/OSPRH-10725 https://issues.redhat.com/browse/OSPRH-1099 https://issues.redhat.com/browse/OSPRH-11068 https://issues.redhat.com/browse/OSPRH-1478 https://issues.redhat.com/browse/OSPRH-2428 https://issues.redhat.com/browse/OSPRH-3466 https://issues.redhat.com/browse/OSPRH-3467 https://issues.redhat.com/browse/OSPRH-4128 https://issues.redhat.com/browse/OSPRH-6501 https://issues.redhat.com/browse/OSPRH-6624 https://issues.redhat.com/browse/OSPRH-6720 https://issues.redhat.com/browse/OSPRH-6951 https://issues.redhat.com/browse/OSPRH-7324 https://issues.redhat.com/browse/OSPRH-7610 https://issues.redhat.com/browse/OSPRH-7817 https://issues.redhat.com/browse/OSPRH-7821 https://issues.redhat.com/browse/OSPRH-8038 https://issues.redhat.com/browse/OSPRH-8058 https://issues.redhat.com/browse/OSPRH-8065 https://issues.redhat.com/browse/OSPRH-8069 https://issues.redhat.com/browse/OSPRH-8072 https://issues.redhat.com/browse/OSPRH-8074 https://issues.redhat.com/browse/OSPRH-8078 https://issues.redhat.com/browse/OSPRH-8118 https://issues.redhat.com/browse/OSPRH-8192 https://issues.redhat.com/browse/OSPRH-8193 https://issues.redhat.com/browse/OSPRH-8195 https://issues.redhat.com/browse/OSPRH-8212 https://issues.redhat.com/browse/OSPRH-8290 https://issues.redhat.com/browse/OSPRH-8508 https://issues.redhat.com/browse/OSPRH-8535 https://issues.redhat.com/browse/OSPRH-8582 https://issues.redhat.com/browse/OSPRH-9285 https://issues.redhat.com/browse/OSPRH-9371 https://issues.redhat.com/browse/OSPRH-9411 https://issues.redhat.com/browse/OSPRH-9455 https://issues.redhat.com/browse/OSPRH-9908 https://issues.redhat.com/browse/OSPRH-9910 https://issues.redhat.com/browse/OSPRH-9991