resource-agents-4.9.0-54.el8
エラータID: AXSA:2024-8344:03
リリース日:
2024/06/18 Tuesday - 16:14
題名:
resource-agents-4.9.0-54.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- urllib には、リクエスト内のメソッドを POST などの本文を
受け入れることができるメソッドから GET に変更し、かつ
レスポンスコード 301、302、および 303 を使用して HTTP
リダイレクト応答を返した際に HTTP リクエストの本文を
削除しない問題があるため、近隣ネットワーク上の攻撃者に
より、情報の漏洩を可能とする脆弱性が存在します。
(CVE-2023-45803)
- PyCryptodome および pycryptodomex の OAEP 復号化処理
には、サイドチャネル情報漏洩の問題があるため、Manger
攻撃とこれによる不正な暗号文の復号を可能とする脆弱性が
存在します。(CVE-2023-52323)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-45803
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
CVE-2023-52323
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
追加情報:
N/A
ダウンロード:
SRPMS
- resource-agents-4.9.0-54.el8.src.rpm
MD5: 32cbf3b9dc2b845700c1b18090391c60
SHA-256: 365da5f93e5ce0b0199540dabf691a11884664d4de1208726550fee1a274e46a
Size: 95.62 MB
Asianux Server 8 for x86_64
- resource-agents-4.9.0-54.el8.x86_64.rpm
MD5: 7ec490e6e203ac5a2c04cc821bf542b4
SHA-256: b6bea81806667f512d2ffdb9e89f3edd573db15a52104c7880e5753f8cc6443c
Size: 543.35 kB - resource-agents-aliyun-4.9.0-54.el8.x86_64.rpm
MD5: f5b5fae26900ac4c56fa523cae623070
SHA-256: 04e63a0cb7225b4ce6664f9a47baeccd4e356a0007f1745b065a1f51ac61efb4
Size: 2.66 MB - resource-agents-gcp-4.9.0-54.el8.x86_64.rpm
MD5: 9ff6fda596de8980c0b4fd219de026d0
SHA-256: 41f4a1003b78d9e2543ed19b6fcab3229a9033995cdb5ef666d0078588d4fdf8
Size: 21.81 MB - resource-agents-paf-4.9.0-54.el8.x86_64.rpm
MD5: 63ca2800d45df4aa25a46f22dc38bbdd
SHA-256: c0c7fccba8589e5c4e5f0cca19290041a6a6e31501c532c583f73b9b704f795f
Size: 73.93 kB