HYCU 5.1.0-2871 security updates

This release contains fixes for the following vulnerabilities:

  • RHBA-2024:5736:

    • CVE-2023-37920: python-certifi: Removal of e-Tugra root certificate
  • RHSA-2024:3626:

    • CVE-2024-25062: libxml2: use-after-free in XMLReader
  • RHSA-2024:4197:

    • CVE-2023-38709: httpd: HTTP response splitting
  • RHSA-2024:4231:

    • CVE-2024-34064: jinja2: accepts keys containing non-attribute characters
  • RHSA-2024:4241:

    • CVE-2023-7250: iperf3: possible denial of service
    • CVE-2024-26306: iperf3: vulnerable to marvin attack if the authentication option is used
  • RHSA-2024:4249:

    • CVE-2024-25629: c-ares: Out of bounds read in ares__read_line()
  • RHSA-2024:4252:

    • CVE-2024-28182: nghttp2: CONTINUATION frames DoS
  • RHSA-2024:4256:

    • CVE-2022-48624: less: missing quoting of shell metacharacters in LESSCLOSE handling
    • CVE-2024-32487: less: OS command injection
  • RHSA-2024:4260:

    • CVE-2024-3651: python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
  • RHSA-2024:4264:

    • CVE-2023-2953: openldap: null pointer dereference in ber_memalloc_x function
  • RHSA-2024:4265:

    • CVE-2024-35235: cups: Cupsd Listen arbitrary chmod 0140777
  • RHSA-2024:4563:

    • CVE-2024-21131: OpenJDK: potential UTF8 size overflow (8314794)
    • CVE-2024-21138: OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
    • CVE-2024-21140: OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
    • CVE-2024-21144: OpenJDK: Pack200 increase loading time due to improper header validation (8322106)
    • CVE-2024-21145: OpenJDK: Out-of-bounds access in 2D image handling (8324559)
    • CVE-2024-21147: OpenJDK: RangeCheckElimination array index overflow (8323231)
  • RHSA-2024:4620:

    • CVE-2024-5564: libndp: buffer overflow in route information length field
  • RHSA-2024:4720:

    • CVE-2024-38473: httpd: Encoding problem in mod_proxy
    • CVE-2024-38474: httpd: Substitution encoding issue in mod_rewrite
    • CVE-2024-38475: httpd: Improper escaping of output in mod_rewrite
    • CVE-2024-38477: httpd: NULL pointer dereference in mod_proxy
    • CVE-2024-39573: httpd: Potential SSRF in mod_rewrite
  • RHSA-2024:5079:

    • CVE-2018-15209: libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c
    • CVE-2023-6228: libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c
    • CVE-2023-25433: libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c
    • CVE-2023-52356: libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service
  • RHSA-2024:5193:

    • CVE-2024-38476: httpd: Security issues via backend applications whose response headers are malicious or exploitable
  • RHSA-2024:5299:

    • CVE-2024-38428: wget: Misinterpretation of input may lead to improper behavior
  • RHSA-2024:5309:

    • CVE-2024-37891: urllib3: proxy-authorization request header is not stripped during cross-origin redirects
  • RHSA-2024:5312:

    • CVE-2024-37370: krb5: GSS message token handling
    • CVE-2024-37371: krb5: GSS message token handling
  • RHSA-2024:5524:

    • CVE-2024-1737: bind: bind9: BIND’s database will be slow if a very large number of RRs exist at the same nam
    • CVE-2024-1975: bind9: bind: SIG(0) can be used to exhaust CPU resources
  • RHSA-2024:5530:

    • CVE-2024-6345: pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
  • RHSA-2024:5654:

    • CVE-2024-2398: curl: HTTP/2 push headers memory-leak
  • RHSA-2024:6001:

    • CVE-2024-4317: postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks
    • CVE-2024-7348: postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
  • RHSA-2024:6963:

    • CVE-2024-6655: gtk3: gtk2: Library injection from CWD
  • RHSA-2024:6975:

    • CVE-2024-4032: python: incorrect IPv4 and IPv6 private ranges
    • CVE-2024-6232: python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
    • CVE-2024-6923: cpython: python: email module doesn’t properly quotes newlines in email headers, allowing header injection
  • RHSA-2024:6986:

    • CVE-2024-5742: nano: running chmod and chown on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
  • RHSA-2024:6989:

    • CVE-2024-45490: libexpat: Negative Length Parsing Vulnerability in libexpat
    • CVE-2024-45491: libexpat: Integer Overflow or Wraparound
    • CVE-2024-45492: libexpat: integer overflow
  • RHSA-2024:7848:

    • CVE-2024-5535: openssl: SSL_select_next_proto buffer overread
  • RHSA-2024:8117:

    • CVE-2023-48161: giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function
    • CVE-2024-21208: JDK: HTTP client improper handling of maxHeaderSize (8328286)
    • CVE-2024-21210: JDK: Array indexing integer overflow (8328544)
    • CVE-2024-21217: JDK: Unbounded allocation leads to out-of-memory error (8331446)
    • CVE-2024-21235: JDK: Integer conversion error leads to incorrect range check (8332644)
  • RHSA-2024:8833:

    • CVE-2024-7006: libtiff: NULL pointer dereference in tif_dirinfo.c
  • RHSA-2024:8860:

    • CVE-2024-3596: freeradius: forgery attack
  • RHSA-2024:8922:

    • CVE-2019-12900: bzip2: out-of-bounds write in function BZ2_decompress
  • RHSA-2024:9502:

    • CVE-2024-50602: libexpat: expat: DoS via XML_ResumeParser
  • RHSA-2024:9573:

    • CVE-2024-52530: libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
    • CVE-2024-52532: libsoup: infinite loop while reading websocket data
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.

Articles in this section