First published: Wed May 22 2024(Updated: )
An ansible-core rebuild for OpenStack based on python 3.9.<br>Security Fix(es):<br><li> HTML attribute injection when passing user input as keys to xmlattr</li> filter (CVE-2024-22195)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-ansible-core | <2.14.2-4.3.el9 | 2.14.2-4.3.el9 |
Red Hat Enterprise Linux 8 | ||
Red Hat OpenStack Director Deployment Tools | ||
Red Hat OpenStack Services on OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:2733 is indicated by the associated CVE-2024-22195, which presents a risk of HTML attribute injection.
To mitigate RHSA-2024:2733, update the 'openstack-ansible-core' package to version 2.14.2-4.3.el9 or later.
RHSA-2024:2733 affects Red Hat Enterprise Linux for x86_64, Red Hat OpenStack Director Deployment Tools, and Red Hat OpenStack.
RHSA-2024:2733 describes a vulnerability related to HTML attribute injection due to improper handling of user input in the xmlattr filter.
CVE-2024-22195 is the specific identifier for the vulnerability that allows HTML attribute injection as noted in RHSA-2024:2733.