Synopsis
Moderate: toolbox security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for toolbox is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
- go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)
- golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
- net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
- golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
- golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
- golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
- golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
- golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
- golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
- golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Affected Products
-
Red Hat Enterprise Linux for x86_64 9 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
-
Red Hat Enterprise Linux Server - AUS 9.4 x86_64
-
Red Hat Enterprise Linux for IBM z Systems 9 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
-
Red Hat Enterprise Linux for Power, little endian 9 ppc64le
-
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
-
Red Hat Enterprise Linux for ARM 64 9 aarch64
-
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
-
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
-
Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
-
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
Fixes
-
BZ - 2163037
- CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
-
BZ - 2165742
- Rebase to 0.0.99.4
-
BZ - 2178358
- CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
-
BZ - 2178488
- CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
-
BZ - 2184481
- CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
-
BZ - 2184482
- CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
-
BZ - 2184483
- CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
-
BZ - 2196026
- CVE-2023-24539 golang: html/template: improper sanitization of CSS values
-
BZ - 2196027
- CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
-
BZ - 2196029
- CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes
-
BZ - 2222167
- CVE-2023-29406 golang: net/http: insufficient sanitization of Host header
-
BZ - 2222789
- 'init-container' fails when /var/lib/flatpak, /var/lib/systemd/coredump or /var/log/journal on the host are mounted with nodev, noexec or nosuid
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 9
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
x86_64 |
toolbox-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: b2ad584039298e0709e5f8dbbfe00a89e2e911cc31b556927ab061719c9dd1cd |
toolbox-debuginfo-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 3f847f25b44799e879bd5d248d06ac69d61263e296664ca15435400146055a86 |
toolbox-debugsource-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 7c8ed1809e4208c8aea56da2903c22db016999b5786a136b2c9fa313081ca178 |
toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 2287e77d4bab98b1031dd675d039696125c83a3e461cee6f0e2254ffa918f2c4 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
x86_64 |
toolbox-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: b2ad584039298e0709e5f8dbbfe00a89e2e911cc31b556927ab061719c9dd1cd |
toolbox-debuginfo-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 3f847f25b44799e879bd5d248d06ac69d61263e296664ca15435400146055a86 |
toolbox-debugsource-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 7c8ed1809e4208c8aea56da2903c22db016999b5786a136b2c9fa313081ca178 |
toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 2287e77d4bab98b1031dd675d039696125c83a3e461cee6f0e2254ffa918f2c4 |
Red Hat Enterprise Linux Server - AUS 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
x86_64 |
toolbox-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: b2ad584039298e0709e5f8dbbfe00a89e2e911cc31b556927ab061719c9dd1cd |
toolbox-debuginfo-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 3f847f25b44799e879bd5d248d06ac69d61263e296664ca15435400146055a86 |
toolbox-debugsource-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 7c8ed1809e4208c8aea56da2903c22db016999b5786a136b2c9fa313081ca178 |
toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 2287e77d4bab98b1031dd675d039696125c83a3e461cee6f0e2254ffa918f2c4 |
Red Hat Enterprise Linux for IBM z Systems 9
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
s390x |
toolbox-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 345065982a5d944ca63102b548d9d74a9f873a30ac093b3f2461dabe643b9319 |
toolbox-debuginfo-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 73f4306dd2b49621fbbed1cf169c8feb56e4de5e2f9f8954a3f34c5c335e262b |
toolbox-debugsource-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: da3314cd5ff00e1ce7f5e09f34074fe8bdd02995f05c5ed987215babcfedf4b7 |
toolbox-tests-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: f5fa22939e46dcc74154272cfb8c7a7fe7403a113d434379364fe6a82958563b |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
s390x |
toolbox-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 345065982a5d944ca63102b548d9d74a9f873a30ac093b3f2461dabe643b9319 |
toolbox-debuginfo-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 73f4306dd2b49621fbbed1cf169c8feb56e4de5e2f9f8954a3f34c5c335e262b |
toolbox-debugsource-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: da3314cd5ff00e1ce7f5e09f34074fe8bdd02995f05c5ed987215babcfedf4b7 |
toolbox-tests-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: f5fa22939e46dcc74154272cfb8c7a7fe7403a113d434379364fe6a82958563b |
Red Hat Enterprise Linux for Power, little endian 9
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
ppc64le |
toolbox-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: c6062a2b7e1a26b31c4a9cdd204f0b543aea2ead9d6c9fb97bfd6cf311f3cc7b |
toolbox-debuginfo-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: e7c1cee615a1e75717f7be295edb03d46cecaf9b69b59f3ed411b613d5bf24ba |
toolbox-debugsource-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: a08f1d40a6dc12909eb1a5e33ca0dbbd37ef7e3cd3a6d7935bba2d382e38adc8 |
toolbox-tests-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: 5a97255d662d1102ae4917cccfd87d6d428fc310e3bc0017621668d151be8f94 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
ppc64le |
toolbox-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: c6062a2b7e1a26b31c4a9cdd204f0b543aea2ead9d6c9fb97bfd6cf311f3cc7b |
toolbox-debuginfo-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: e7c1cee615a1e75717f7be295edb03d46cecaf9b69b59f3ed411b613d5bf24ba |
toolbox-debugsource-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: a08f1d40a6dc12909eb1a5e33ca0dbbd37ef7e3cd3a6d7935bba2d382e38adc8 |
toolbox-tests-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: 5a97255d662d1102ae4917cccfd87d6d428fc310e3bc0017621668d151be8f94 |
Red Hat Enterprise Linux for ARM 64 9
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
aarch64 |
toolbox-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 297c3f0d247df5be2238c8f9642788507dc9c715a36e6585ff07a7a198b2a932 |
toolbox-debuginfo-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: eb10108cad4b60a3fb2d9ff544cfa0950070b915c5e7db7be449d66f40810b47 |
toolbox-debugsource-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 0f43df3078768b4557b61bb1cbb0d1fe78df7e04a6458f1788f48373b38b225e |
toolbox-tests-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 7f9bfb1ce2feb8c68b1b7995b77713ee1f199216de47a59c873748fedc38f257 |
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
aarch64 |
toolbox-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 297c3f0d247df5be2238c8f9642788507dc9c715a36e6585ff07a7a198b2a932 |
toolbox-debuginfo-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: eb10108cad4b60a3fb2d9ff544cfa0950070b915c5e7db7be449d66f40810b47 |
toolbox-debugsource-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 0f43df3078768b4557b61bb1cbb0d1fe78df7e04a6458f1788f48373b38b225e |
toolbox-tests-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 7f9bfb1ce2feb8c68b1b7995b77713ee1f199216de47a59c873748fedc38f257 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
ppc64le |
toolbox-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: c6062a2b7e1a26b31c4a9cdd204f0b543aea2ead9d6c9fb97bfd6cf311f3cc7b |
toolbox-debuginfo-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: e7c1cee615a1e75717f7be295edb03d46cecaf9b69b59f3ed411b613d5bf24ba |
toolbox-debugsource-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: a08f1d40a6dc12909eb1a5e33ca0dbbd37ef7e3cd3a6d7935bba2d382e38adc8 |
toolbox-tests-0.0.99.4-6.el9_3.ppc64le.rpm
|
SHA-256: 5a97255d662d1102ae4917cccfd87d6d428fc310e3bc0017621668d151be8f94 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
x86_64 |
toolbox-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: b2ad584039298e0709e5f8dbbfe00a89e2e911cc31b556927ab061719c9dd1cd |
toolbox-debuginfo-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 3f847f25b44799e879bd5d248d06ac69d61263e296664ca15435400146055a86 |
toolbox-debugsource-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 7c8ed1809e4208c8aea56da2903c22db016999b5786a136b2c9fa313081ca178 |
toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm
|
SHA-256: 2287e77d4bab98b1031dd675d039696125c83a3e461cee6f0e2254ffa918f2c4 |
Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
aarch64 |
toolbox-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 297c3f0d247df5be2238c8f9642788507dc9c715a36e6585ff07a7a198b2a932 |
toolbox-debuginfo-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: eb10108cad4b60a3fb2d9ff544cfa0950070b915c5e7db7be449d66f40810b47 |
toolbox-debugsource-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 0f43df3078768b4557b61bb1cbb0d1fe78df7e04a6458f1788f48373b38b225e |
toolbox-tests-0.0.99.4-6.el9_3.aarch64.rpm
|
SHA-256: 7f9bfb1ce2feb8c68b1b7995b77713ee1f199216de47a59c873748fedc38f257 |
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4
SRPM |
toolbox-0.0.99.4-6.el9_3.src.rpm
|
SHA-256: 44d9872e76bcc0c70d59e026bd8482b0660e83ca8f752d9ce6b2f6eda71d26b8 |
s390x |
toolbox-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 345065982a5d944ca63102b548d9d74a9f873a30ac093b3f2461dabe643b9319 |
toolbox-debuginfo-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: 73f4306dd2b49621fbbed1cf169c8feb56e4de5e2f9f8954a3f34c5c335e262b |
toolbox-debugsource-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: da3314cd5ff00e1ce7f5e09f34074fe8bdd02995f05c5ed987215babcfedf4b7 |
toolbox-tests-0.0.99.4-6.el9_3.s390x.rpm
|
SHA-256: f5fa22939e46dcc74154272cfb8c7a7fe7403a113d434379364fe6a82958563b |