{"id":"RLSA-2023:6939","summary":"Moderate: container-tools:rhel8 security and bug fix update","details":"The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n\n* golang.org/x/net/html: Cross site scripting (CVE-2023-3978)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* containerd: Supplementary groups are not set up properly (CVE-2023-25173)\n\n* runc: Rootless runc makes `/sys/fs/cgroup` writable (CVE-2023-25809)\n\n* runc: volume mount race condition (regression of CVE-2019-19921) (CVE-2023-27561)\n\n* runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration (CVE-2023-28642)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.","modified":"2026-03-11T06:26:24.560423Z","published":"2025-11-28T09:04:16.963841Z","upstream":["CVE-2022-3064","CVE-2022-41723","CVE-2022-41724","CVE-2022-41725","CVE-2023-24534","CVE-2023-24536","CVE-2023-24537","CVE-2023-24538","CVE-2023-24539","CVE-2023-24540","CVE-2023-25173","CVE-2023-25809","CVE-2023-27561","CVE-2023-28642","CVE-2023-29400","CVE-2023-29406","CVE-2023-3978"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:6939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163037"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174485"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182884"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222167"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228689"}],"affected":[{"package":{"name":"libslirp","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/libslirp?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.4.0-1.module+el8.9.0+1445+07728297"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:6939.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}