Angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for injection of unexpected HMTL, if executed with untrusted input.
Created golang tracking bugs for this issue: Affects: epel-all [bug 2196470] Affects: fedora-all [bug 2196471]
References: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU Go issue https://go.dev/issue/59720 Commits: https://github.com/golang/go/commit/8673ca81e5340b87709db2d9749c92a3bf925df1 [Master] https://github.com/golang/go/commit/e49282327b05192e46086bf25fd3ac691205fe80 [release-branch.go1.19] https://github.com/golang/go/commit/090590fdccc8442728aa31601927da1bf2ef1288 [release-branch.go1.20]
This issue has been addressed in the following products: Red Hat Developer Tools Via RHSA-2023:3323 https://access.redhat.com/errata/RHSA-2023:3323
This issue has been addressed in the following products: RHACS-4.0-RHEL-8 Via RHSA-2023:3415 https://access.redhat.com/errata/RHSA-2023:3415
This issue has been addressed in the following products: RHACS-3.74-RHEL-8 Via RHSA-2023:3435 https://access.redhat.com/errata/RHSA-2023:3435
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.2 Via RHSA-2023:3445 https://access.redhat.com/errata/RHSA-2023:3445
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:3367 https://access.redhat.com/errata/RHSA-2023:3367
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:3540 https://access.redhat.com/errata/RHSA-2023:3540
This issue has been addressed in the following products: NETWORK-OBSERVABILITY-1.3.0-RHEL-9 Via RHSA-2023:3905 https://access.redhat.com/errata/RHSA-2023:3905
This issue has been addressed in the following products: OADP-1.1-RHEL-8 Via RHSA-2023:3918 https://access.redhat.com/errata/RHSA-2023:3918
This issue has been addressed in the following products: Service Interconnect 1 for RHEL 8 Service Interconnect 1 for RHEL 9 Via RHSA-2023:4003 https://access.redhat.com/errata/RHSA-2023:4003
Were the bugs for this CVE created correctly? I got bugs RHEL 8 bugs for toolbox for both the rolling (bug 2207514) and 4.0 (bug 2207509) module streams, but none for RHEL 9. In comparison, I found a RHEL 8 podman bug for the 4.0 module stream (bug 2207507) and one for RHEL 9 (bug 2207522). I also found a RHEL 9 bug for golang (bug 2203251). So, it seems like RHEL 9 is affected, but then why is there no RHEL 9 toolbox bug? There's no difference in toolbox across RHEL 8 and 9 that could be relevant to this CVE.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Ironic content for Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:4093 https://access.redhat.com/errata/RHSA-2023:4093
This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.7 Via RHSA-2023:4293 https://access.redhat.com/errata/RHSA-2023:4293
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.3 for RHEL 8 Via RHSA-2023:4470 https://access.redhat.com/errata/RHSA-2023:4470
This issue has been addressed in the following products: RHOSS-1.29-RHEL-8 Via RHSA-2023:4472 https://access.redhat.com/errata/RHSA-2023:4472
This issue has been addressed in the following products: CERT-MANAGER-1.10-RHEL-9 Via RHSA-2023:4335 https://access.redhat.com/errata/RHSA-2023:4335
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:4459 https://access.redhat.com/errata/RHSA-2023:4459
This issue has been addressed in the following products: MTA-6.2-RHEL-9 MTA-6.2-RHEL-8 Via RHSA-2023:4627 https://access.redhat.com/errata/RHSA-2023:4627
This issue has been addressed in the following products: RHEL-9-CNV-4.13 Via RHSA-2023:4664 https://access.redhat.com/errata/RHSA-2023:4664