{"id":"ALSA-2023:6346","summary":"Moderate: toolbox security and bug fix update","details":"Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.\n\nSecurity Fix(es):\n\n* go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T02:15:05.204038Z","published":"2023-11-07T00:00:00Z","related":["CVE-2022-3064","CVE-2022-41723","CVE-2022-41725","CVE-2023-24534","CVE-2023-24536","CVE-2023-24538","CVE-2023-24539","CVE-2023-24540","CVE-2023-29400","CVE-2023-29406"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6346"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3064"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41723"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41725"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29400"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2163037"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2222167"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-6346.html"}],"affected":[{"package":{"name":"toolbox","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/toolbox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.0.99.4-6.el9_3"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6346.json"}},{"package":{"name":"toolbox-tests","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/toolbox-tests"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.0.99.4-6.el9_3"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6346.json"}}],"schema_version":"1.7.3"}