Bug 2219310 (CVE-2023-26136)
Summary: | CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aazores, abarbaro, abobrov, adupliak, aileenc, alampare, alazarot, alcohan, amctagga, andrew.slice, anjoseph, aoconnor, asoldano, bbaranow, bbuckingham, bcourt, bdettelb, bmaxwell, bniver, bodavis, brian.stansberry, cdaley, cdewolf, chazlett, cluster-maint, cmah, cmiranda, danken, darran.lofthouse, dbhole, dcadzow, dfreiber, dhanak, dholler, dkenigsb, dkreling, doconnor, dosoudil, drow, dsimansk, dymurray, eaguilar, ebaron, ecerquei, ehelms, ellin, emingora, erack, eric.wittmann, fdeutsch, fjuma, flucifre, fzatlouk, ggainey, gjospin, gkamathe, gmalinko, gmeno, gotiwari, gparvin, grafana-maint, gtanzill, gzaronik, hhorak, ibek, ibolton, idevat, idm-ds-dev-bugs, istudens, ivassile, iweiss, janstey, jburrell, jcantril, jchui, jforrest, jhe, jhorak, jkang, jkoehler, jkurik, jmatthew, jmontleo, jolong, jorton, jpallich, jprabhak, jrokos, jscotka, jshaughn, jsherril, juwatts, jwendell, jweng, kingland, ktsao, kverlaen, lbacciot, lbainbri, lball, lchilton, lgao, lphiri, lzap, matzew, mbenjamin, mhackett, mhulan, mlisik, mnovotny, mosmerov, mpitt, mpospisi, msochure, mstefank, msvehla, mvyas, mwringe, myarboro, nathans, nbecker, nboldt, nipatil, njean, nmoumoul, nodejs-maint, nwallace, omajid, omular, orabin, oramraz, owatkins, pahickey, pantinor, pcongius, pcreech, pdelbell, peholase, pesilva, pgaikwad, phoracek, pierdipi, pjindal, pmackay, psrna, rcernich, rchan, release-test-team-automation, rguimara, rhaigner, rhuss, rjohnson, rkubis, rogbas, rojacob, rstancel, rstepani, saroy, scorneli, sdawley, sfeifer, sfroberg, sgott, shbose, slucidi, smaestri, smallamp, smullick, sostapov, sseago, stcannon, stirabos, stransky, teagle, thason, tojeline, tom.jenkinson, tpopela, twalsh, vereddy, vkumar, wtam |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | tough-cookie 4.1.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-07-12 22:50:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2220673, 2220674, 2220675, 2219314, 2219315, 2219316, 2219318, 2219319, 2219320, 2219321, 2219322, 2219325, 2219336, 2219337, 2219338, 2219339, 2219346, 2219347, 2220676, 2220677, 2220678, 2220679, 2220680, 2220681, 2220682, 2223508, 2304972 | ||
Bug Blocks: | 2219348 |
Description
TEJ RATHI
2023-07-03 08:18:43 UTC
Created breeze-icon-theme tracking bugs for this issue: Affects: epel-all [bug 2220673] Affects: fedora-all [bug 2220678] Created dotnet6.0 tracking bugs for this issue: Affects: fedora-all [bug 2220679] Created dotnet7.0 tracking bugs for this issue: Affects: fedora-all [bug 2220680] Created golang-github-prometheus tracking bugs for this issue: Affects: epel-all [bug 2220674] Created nodejs:13/nodejs tracking bugs for this issue: Affects: epel-all [bug 2220675] Created seamonkey tracking bugs for this issue: Affects: epel-all [bug 2220676] Affects: fedora-all [bug 2220681] Created yarnpkg tracking bugs for this issue: Affects: epel-all [bug 2220677] Affects: fedora-all [bug 2220682] This issue has been addressed in the following products: RHOL-5.7-RHEL-8 Via RHSA-2023:3998 https://access.redhat.com/errata/RHSA-2023:3998 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-26136 Created golang-github-prometheus tracking bugs for this issue: Affects: fedora-all [bug 2223508] This issue has been addressed in the following products: multicluster engine for Kubernetes 2.3 for RHEL 8 Via RHSA-2023:5421 https://access.redhat.com/errata/RHSA-2023:5421 This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.8 for RHEL 8 Via RHSA-2023:5442 https://access.redhat.com/errata/RHSA-2023:5442 This issue has been addressed in the following products: EAP 7.4.13 Via RHSA-2023:5488 https://access.redhat.com/errata/RHSA-2023:5488 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2023:5484 https://access.redhat.com/errata/RHSA-2023:5484 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2023:5485 https://access.redhat.com/errata/RHSA-2023:5485 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2023:5486 https://access.redhat.com/errata/RHSA-2023:5486 This issue has been addressed in the following products: RHOL-5.6-RHEL-8 Via RHSA-2023:5541 https://access.redhat.com/errata/RHSA-2023:5541 This issue has been addressed in the following products: RHOL-5.5-RHEL-8 Via RHSA-2023:5542 https://access.redhat.com/errata/RHSA-2023:5542 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2023:5006 https://access.redhat.com/errata/RHSA-2023:5006 This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.8 Via RHSA-2023:7222 https://access.redhat.com/errata/RHSA-2023:7222 Marking EAP-8 as not affected because EAP 8 GA was released with the fixed version of netty. This issue has been addressed in the following products: RHODF-4.17-RHEL-9 Via RHSA-2024:8676 https://access.redhat.com/errata/RHSA-2024:8676 This issue has been addressed in the following products: RHODF-4.16-RHEL-9 Via RHSA-2025:0082 https://access.redhat.com/errata/RHSA-2025:0082 This issue has been addressed in the following products: RHODF-4.15-RHEL-9 Via RHSA-2025:0164 https://access.redhat.com/errata/RHSA-2025:0164 This issue has been addressed in the following products: RHODF-4.14-RHEL-9 Via RHSA-2025:0323 https://access.redhat.com/errata/RHSA-2025:0323 |