RLSA-2024:9135

Source
https://errata.rockylinux.org/RLSA-2024:9135
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:9135.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:9135
Related
Published
2025-03-17T20:16:49.937392Z
Modified
2025-03-17T20:19:04.413604Z
Summary
Moderate: toolbox security update
Details

Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.

Security Fix(es):

  • golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)

  • golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)

  • golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)

  • net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / toolbox

Package

Name
toolbox
Purl
pkg:rpm/rocky-linux/toolbox?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.0.99.5-5.el9.rocky.0.2