First published: Tue May 09 2023(Updated: )
Butane translates human-readable Butane Configs into machine-readable Ignition configs for provisioning operating systems that use Ignition.<br>The following packages have been upgraded to a later upstream version: butane (0.16.0). (BZ#2135475)<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> handle server errors after sending GOAWAY (CVE-2022-27664)</li> <li> golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/butane | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debuginfo | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debugsource | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debuginfo | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debugsource | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debuginfo | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane-debugsource | <0.16.0-1.el9 | 0.16.0-1.el9 |
redhat/butane | <0.16.0-1.el9.aa | 0.16.0-1.el9.aa |
redhat/butane-debuginfo | <0.16.0-1.el9.aa | 0.16.0-1.el9.aa |
redhat/butane-debugsource | <0.16.0-1.el9.aa | 0.16.0-1.el9.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:2193 is classified as moderate.
To fix RHSA-2023:2193, upgrade the butane package to version 0.16.0-1.el9 or later.
The affected packages include butane, butane-debuginfo, and butane-debugsource for various architectures.
No specific workarounds are mentioned for RHSA-2023:2193; upgrading is recommended.
RHSA-2023:2193 was released on the date corresponding with the notification about the vulnerability.