从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:RHSA-2024:6744 2. 发布日期:2024-09-18 3. 类型/严重性:安全公告,严重性为中等 4. 受影响的产品: - Red Hat Ansible Automation Platform 2.4 - Red Hat Ansible Automation Platform 2.4 for RHEL 9 x86_64 - Red Hat Ansible Automation Platform 2.4 for RHEL 9 s390x - Red Hat Ansible Automation Platform 2.4 for RHEL 9 ppc64le - Red Hat Ansible Automation Platform 2.4 for RHEL 9 aarch64 - Red Hat Ansible Automation Platform 2.4 for RHEL 8 x86_64 - Red Hat Ansible Automation Platform 2.4 for RHEL 8 s390x - Red Hat Ansible Automation Platform 2.4 for RHEL 8 ppc64le - Red Hat Ansible Automation Platform 2.4 for RHEL 8 aarch64 - Red Hat Ansible Inside 1.2 for RHEL 9 x86_64 - Red Hat Ansible Inside 1.2 for RHEL 9 s390x - Red Hat Ansible Inside 1.2 for RHEL 9 ppc64le - Red Hat Ansible Inside 1.2 for RHEL 9 aarch64 - Red Hat Ansible Inside 1.2 for RHEL 8 x86_64 - Red Hat Ansible Inside 1.2 for RHEL 8 s390x - Red Hat Ansible Inside 1.2 for RHEL 8 ppc64le - Red Hat Ansible Inside 1.2 for RHEL 8 aarch64 - Red Hat Ansible Developer 1.1 for RHEL 9 x86_64 - Red Hat Ansible Developer 1.1 for RHEL 9 s390x - Red Hat Ansible Developer 1.1 for RHEL 9 ppc64le - Red Hat Ansible Developer 1.1 for RHEL 9 aarch64 - Red Hat Ansible Developer 1.1 for RHEL 8 x86_64 - Red Hat Ansible Developer 1.1 for RHEL 8 s390x - Red Hat Ansible Developer 1.1 for RHEL 8 ppc64le - Red Hat Ansible Developer 1.1 for RHEL 8 aarch64 4. 安全修复: - python3-pulpcore/python39-pulpcore: RBAC permissions incorrectly assigned in tasks that create objects (CVE-2024-7143) - python3-urllib3/python39-urllib3: urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) - receptor: golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790) - receptor: golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) 5. 解决方案: - 更新自动化控制器的依赖库和版本 - 更新自动化控制器到4.5.11 6. 参考链接: - https://access.redhat.com/security/updates/classification/#moderate 这些信息可以帮助用户了解漏洞的详细情况、受影响的产品范围以及如何进行修复。