containernetworking-plugins-1.5.1-2.el9
エラータID: AXSA:2024-9094:06
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
* net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.5 Release Notes linked from the References section.
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Update packages.
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
N/A
SRPMS
- containernetworking-plugins-1.5.1-2.el9.src.rpm
MD5: 9854232929be83714879a459744f10a0
SHA-256: f9a6ad8597bbf598fb9158db22032c895e39de31d237dbebfb9113d86d3cea4b
Size: 3.46 MB
Asianux Server 9 for x86_64
- containernetworking-plugins-1.5.1-2.el9.x86_64.rpm
MD5: c7134b33f5589cb22b5d8488ff297928
SHA-256: 787605c3adfd07b5e8f36595f04031cb1cbdd7a264ea3a55e4ce14d67e5f394f
Size: 9.79 MB