{"id":"ALSA-2023:6402","summary":"Moderate: containernetworking-plugins security and bug fix update","details":"The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. \n\nSecurity Fix(es):\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T00:56:19.555101Z","published":"2023-11-07T00:00:00Z","related":["CVE-2022-41723","CVE-2022-41724","CVE-2022-41725","CVE-2023-24534","CVE-2023-24536","CVE-2023-24538","CVE-2023-24539","CVE-2023-24540","CVE-2023-29400","CVE-2023-29406"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6402"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41723"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41724"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41725"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29400"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2222167"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-6402.html"}],"affected":[{"package":{"name":"containernetworking-plugins","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/containernetworking-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.3.0-4.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6402.json"}}],"schema_version":"1.7.3"}