what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-2780-01

Red Hat Security Advisory 2023-2780-01
Posted May 16, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-2780-01 - Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-27664, CVE-2022-2879, CVE-2022-2880, CVE-2022-41715, CVE-2022-41717
SHA-256 | 676edf27dc6043c0fe32e0a0c3693ef1c60c596ad51ae34e163fed07eb21da6a

Red Hat Security Advisory 2023-2780-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Image Builder security, bug fix, and enhancement update
Advisory ID: RHSA-2023:2780-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2780
Issue date: 2023-05-16
CVE Names: CVE-2022-2879 CVE-2022-2880 CVE-2022-27664
CVE-2022-41715 CVE-2022-41717
====================================================================
1. Summary:

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client
is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

Image Builder is a service for building customized OS artifacts, such as VM
images and OSTree commits, that uses osbuild under the hood.

Security Fix(es):

* golang: archive/tar: unbounded memory consumption when reading headers
(CVE-2022-2879)

* golang: net/http/httputil: ReverseProxy should not forward unparseable
query parameters (CVE-2022-2880)

* golang: net/http: handle server errors after sending GOAWAY
(CVE-2022-27664)

* golang: regexp/syntax: limit memory used by parsing regexps
(CVE-2022-41715)

* golang: net/http: An attacker can cause excessive memory growth in a Go
server accepting HTTP/2 requests (CVE-2022-41717)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.8 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2033192 - weldr-client doesn't convert --size to bytes before sending it to osbuild-composer
2063126 - [Azure] Suggest to add 68-azure-sriov-nm-unmanaged.rules
2072834 - [Azure][image] Suggest to enable nm-cloud-setup.timer in Azure images
2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY
2132254 - Update Image Builder suite of projects to their latest upstream releases [RHEL-8.8]
2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers
2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
2136503 - osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6
2139721 - [cockpit-composer] RHEL 8.8 Tier 0 Localization
2141738 - Image builder fails with Volume group "XXX" has insufficient free space (975 extents): 977 required.
2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
2168666 - Rebase to weldr-client v35.9

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
cockpit-composer-45-1.el8_8.src.rpm
osbuild-81-1.el8.src.rpm
osbuild-composer-75-1.el8.src.rpm
weldr-client-35.9-2.el8.src.rpm

aarch64:
osbuild-composer-75-1.el8.aarch64.rpm
osbuild-composer-core-75-1.el8.aarch64.rpm
osbuild-composer-core-debuginfo-75-1.el8.aarch64.rpm
osbuild-composer-debuginfo-75-1.el8.aarch64.rpm
osbuild-composer-debugsource-75-1.el8.aarch64.rpm
osbuild-composer-dnf-json-75-1.el8.aarch64.rpm
osbuild-composer-tests-debuginfo-75-1.el8.aarch64.rpm
osbuild-composer-worker-75-1.el8.aarch64.rpm
osbuild-composer-worker-debuginfo-75-1.el8.aarch64.rpm
weldr-client-35.9-2.el8.aarch64.rpm
weldr-client-debuginfo-35.9-2.el8.aarch64.rpm
weldr-client-debugsource-35.9-2.el8.aarch64.rpm
weldr-client-tests-debuginfo-35.9-2.el8.aarch64.rpm

noarch:
cockpit-composer-45-1.el8_8.noarch.rpm
osbuild-81-1.el8.noarch.rpm
osbuild-luks2-81-1.el8.noarch.rpm
osbuild-lvm2-81-1.el8.noarch.rpm
osbuild-ostree-81-1.el8.noarch.rpm
osbuild-selinux-81-1.el8.noarch.rpm
python3-osbuild-81-1.el8.noarch.rpm

ppc64le:
osbuild-composer-75-1.el8.ppc64le.rpm
osbuild-composer-core-75-1.el8.ppc64le.rpm
osbuild-composer-core-debuginfo-75-1.el8.ppc64le.rpm
osbuild-composer-debuginfo-75-1.el8.ppc64le.rpm
osbuild-composer-debugsource-75-1.el8.ppc64le.rpm
osbuild-composer-dnf-json-75-1.el8.ppc64le.rpm
osbuild-composer-tests-debuginfo-75-1.el8.ppc64le.rpm
osbuild-composer-worker-75-1.el8.ppc64le.rpm
osbuild-composer-worker-debuginfo-75-1.el8.ppc64le.rpm
weldr-client-35.9-2.el8.ppc64le.rpm
weldr-client-debuginfo-35.9-2.el8.ppc64le.rpm
weldr-client-debugsource-35.9-2.el8.ppc64le.rpm
weldr-client-tests-debuginfo-35.9-2.el8.ppc64le.rpm

s390x:
osbuild-composer-75-1.el8.s390x.rpm
osbuild-composer-core-75-1.el8.s390x.rpm
osbuild-composer-core-debuginfo-75-1.el8.s390x.rpm
osbuild-composer-debuginfo-75-1.el8.s390x.rpm
osbuild-composer-debugsource-75-1.el8.s390x.rpm
osbuild-composer-dnf-json-75-1.el8.s390x.rpm
osbuild-composer-tests-debuginfo-75-1.el8.s390x.rpm
osbuild-composer-worker-75-1.el8.s390x.rpm
osbuild-composer-worker-debuginfo-75-1.el8.s390x.rpm
weldr-client-35.9-2.el8.s390x.rpm
weldr-client-debuginfo-35.9-2.el8.s390x.rpm
weldr-client-debugsource-35.9-2.el8.s390x.rpm
weldr-client-tests-debuginfo-35.9-2.el8.s390x.rpm

x86_64:
osbuild-composer-75-1.el8.x86_64.rpm
osbuild-composer-core-75-1.el8.x86_64.rpm
osbuild-composer-core-debuginfo-75-1.el8.x86_64.rpm
osbuild-composer-debuginfo-75-1.el8.x86_64.rpm
osbuild-composer-debugsource-75-1.el8.x86_64.rpm
osbuild-composer-dnf-json-75-1.el8.x86_64.rpm
osbuild-composer-tests-debuginfo-75-1.el8.x86_64.rpm
osbuild-composer-worker-75-1.el8.x86_64.rpm
osbuild-composer-worker-debuginfo-75-1.el8.x86_64.rpm
weldr-client-35.9-2.el8.x86_64.rpm
weldr-client-debuginfo-35.9-2.el8.x86_64.rpm
weldr-client-debugsource-35.9-2.el8.x86_64.rpm
weldr-client-tests-debuginfo-35.9-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-2879
https://access.redhat.com/security/cve/CVE-2022-2880
https://access.redhat.com/security/cve/CVE-2022-27664
https://access.redhat.com/security/cve/CVE-2022-41715
https://access.redhat.com/security/cve/CVE-2022-41717
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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ŒjS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close