[ALSA-2024:9135] Moderate: toolbox security update
Type:
security
Severity:
moderate
Release date:
2024-11-18
Description:
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/[http:](http:) golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) * net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 toolbox-tests-0.0.99.5-5.el9.aarch64.rpm 3383d6b33d4ce3b41baae4cb52db248774f7355e15bc080eb64cfc2d56f967bd
aarch64 toolbox-0.0.99.5-5.el9.aarch64.rpm 3e33b5fd73e9788dc267481801adf79bece0a7019a4ed1626bf0fb374678cccf
ppc64le toolbox-0.0.99.5-5.el9.ppc64le.rpm 1bcf4e401a9a7305461eaaeb58af2b710cd55fa66f84c118547660de7d5ce51c
ppc64le toolbox-tests-0.0.99.5-5.el9.ppc64le.rpm 246725e83a438de4879e9d74e227d47a92a4f815bdd7d6cb8b2db3b4c7fc4896
s390x toolbox-0.0.99.5-5.el9.s390x.rpm 04c8b37f9c1d69ce08c1f2885dccf33cc8b912077533b44a50582de9649f0f28
s390x toolbox-tests-0.0.99.5-5.el9.s390x.rpm 1c20fd10cd6d96e44139018861f5a10539c0d56c7296c7ea798a8501578318cd
x86_64 toolbox-0.0.99.5-5.el9.x86_64.rpm 3a1c61965f7ad843105aa6af4a734f0b10ced2f7a4554c082555f186bdfcd5c4
x86_64 toolbox-tests-0.0.99.5-5.el9.x86_64.rpm bb356c3bd0c7fd0317e354d9e276577eb46bc76052e866e5dc77955105b370f9
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.