Rocky Linux 8fence-agents (RLSA-2024:2968)

medium Nessus Plugin ID 200627

概要

遠端 Rocky Linux 主機缺少一個或多個安全性更新。

說明

遠端 Rocky Linux 8 主機已安裝受到多個弱點影響的套件如 RLSA-2024:2968 公告中所提及。

* urllib3 : 從 303 狀態重新導向後未去除的要求內文將要求方法變更為 GET (CVE-2023-45803)

* pycryptodome:PyCryptodome 和 pycryptodomex 的 OAEP 解密中存在側通道洩漏弱點 (CVE-2023-52323)

* jinja2:將使用者輸入作為金鑰傳遞至 xmlattr 篩選器時,發生 HTML 屬性插入攻擊 (CVE-2024-22195)

Tenable 已直接從 Rocky Linux 安全性公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://errata.rockylinux.org/RLSA-2024:2968

https://bugzilla.redhat.com/show_bug.cgi?id=2246840

https://bugzilla.redhat.com/show_bug.cgi?id=2257028

https://bugzilla.redhat.com/show_bug.cgi?id=2257854

Plugin 詳細資訊

嚴重性: Medium

ID: 200627

檔案名稱: rocky_linux_RLSA-2024-2968.nasl

版本: 1.1

類型: local

已發布: 2024/6/14

已更新: 2024/6/14

支援的感應器: Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 4.4

CVSS v2

風險因素: Medium

基本分數: 6.4

時間性分數: 4.7

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS 評分資料來源: CVE-2024-22195

CVSS v3

風險因素: Medium

基本分數: 6.1

時間性分數: 5.3

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:rocky:linux:fence-agents-lpar, p-cpe:/a:rocky:linux:fence-agents-rsa, p-cpe:/a:rocky:linux:fence-agents-brocade, p-cpe:/a:rocky:linux:fence-agents-eaton-snmp, p-cpe:/a:rocky:linux:fence-agents-ifmib, p-cpe:/a:rocky:linux:fence-agents-ilo-mp, p-cpe:/a:rocky:linux:fence-agents-apc, p-cpe:/a:rocky:linux:fence-agents-scsi, p-cpe:/a:rocky:linux:fence-agents-vmware-soap, p-cpe:/a:rocky:linux:fence-agents-sbd, p-cpe:/a:rocky:linux:fence-agents-hpblade, p-cpe:/a:rocky:linux:fence-agents-ibm-vpc, p-cpe:/a:rocky:linux:fence-agents-wti, p-cpe:/a:rocky:linux:fence-agents-aliyun, p-cpe:/a:rocky:linux:fence-agents-azure-arm, p-cpe:/a:rocky:linux:fence-agents-all, p-cpe:/a:rocky:linux:fence-agents-compute, p-cpe:/a:rocky:linux:fence-agents-rsb, p-cpe:/a:rocky:linux:fence-agents-common, p-cpe:/a:rocky:linux:fence-agents-debugsource, p-cpe:/a:rocky:linux:fence-agents-intelmodular, p-cpe:/a:rocky:linux:fence-agents-virsh, p-cpe:/a:rocky:linux:fence-agents-openstack, p-cpe:/a:rocky:linux:fence-agents-ibm-powervs, p-cpe:/a:rocky:linux:fence-agents-drac5, p-cpe:/a:rocky:linux:fence-agents-cisco-mds, p-cpe:/a:rocky:linux:fence-agents-emerson, p-cpe:/a:rocky:linux:fence-agents-rhevm, p-cpe:/a:rocky:linux:fence-agents-vmware-rest, p-cpe:/a:rocky:linux:fence-agents-ilo-moonshot, p-cpe:/a:rocky:linux:fence-agents-kdump, p-cpe:/a:rocky:linux:fence-agents-kubevirt, p-cpe:/a:rocky:linux:fence-agents-gce, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:fence-agents-ilo-ssh, p-cpe:/a:rocky:linux:fence-agents-cisco-ucs, p-cpe:/a:rocky:linux:fence-agents-kdump-debuginfo, p-cpe:/a:rocky:linux:fence-agents-eps, p-cpe:/a:rocky:linux:fence-agents-ipmilan, p-cpe:/a:rocky:linux:fence-agents-mpath, p-cpe:/a:rocky:linux:fence-agents-amt-ws, p-cpe:/a:rocky:linux:fence-agents-ibmblade, p-cpe:/a:rocky:linux:fence-agents-ipdu, p-cpe:/a:rocky:linux:fence-agents-redfish, p-cpe:/a:rocky:linux:fence-agents-aws, p-cpe:/a:rocky:linux:fence-agents-heuristics-ping, p-cpe:/a:rocky:linux:fence-agents-ilo2, p-cpe:/a:rocky:linux:fence-agents-debuginfo, p-cpe:/a:rocky:linux:fence-agents-kubevirt-debuginfo, p-cpe:/a:rocky:linux:fence-agents-aliyun-debuginfo, p-cpe:/a:rocky:linux:fence-agents-apc-snmp, p-cpe:/a:rocky:linux:fence-agents-bladecenter

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/6/14

弱點發布日期: 2023/10/17

參考資訊

CVE: CVE-2023-45803, CVE-2023-52323, CVE-2024-22195