Chapter 17. 4.11.3 Release Notes
17.1. Bug Fixes Copy linkLink copied to clipboard!
The following bugs have been fixed in Red Hat Update Infrastructure 4.11.3.
This update addresses several vulnerabilities within the urllib3 library pertaining to the handling of compressed content (e.g., gzip, deflate, br, or zstd). A remote attacker could potentially provide specially crafted content that, when processed, leads to excessive CPU utilization and significant memory allocation during decompression, potentially resulting in a denial-of-service (DoS) condition.
- Deployment Notes
- RHUA nodes: The updated python3-urllib3 package provided in this errata is intended specifically for Red Hat Update Appliance (RHUA) nodes.
- CDS nodes: Content Delivery Server (CDS) nodes should receive the corresponding update directly from the standard Red Hat Enterprise Linux (RHEL) distribution channels.
- Impact Assessment
- Under standard operating conditions, a properly secured RHUI environment is not expected to be impacted by these vulnerabilities, as the RHUA typically communicates only with trusted endpoints. However, as a matter of security best practice, all RHUI administrators are strongly advised to apply this update to mitigate potential risks.
- Apply the update
This update is delivered via a package update, not a new installer. To apply the fix, update the necessary package:
dnf -y update python3.11-urllib3
dnf -y update python3.11-urllib3Copy to Clipboard Copied! Toggle word wrap Toggle overflow (Alternatively, rerunning the current rhui-installer will also install this package update automatically.)
- Restart RHUI services
Execute the following command for the update to take effect:
rhui-services-restart
rhui-services-restartCopy to Clipboard Copied! Toggle word wrap Toggle overflow (Alternatively, if you have rerun the installer, this command is not needed because rerunning the installer restarts RHUI services automatically.)