- Issued:
- 2023-10-25
- Updated:
- 2023-10-25
RHSA-2023:6115 - Important: OpenShift API for Data Protection security update
Synopsis
Important: OpenShift API for Data Protection security update
Type/Severity
Security Advisory Important
Topic
An update is now available for OADP-1.1-RHEL-8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Security Fix(es):
-
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)
-
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
-
golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)
-
golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)
-
golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)
-
golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)
-
golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)
-
golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| OpenShift API for Data Protection | 1 | x86_64 |
Fixes
- This content is not included.BZ - 2222167
- This content is not included.BZ - 2228743
- This content is not included.BZ - 2237773
- This content is not included.BZ - 2237776
- This content is not included.BZ - 2237777
- This content is not included.BZ - 2237778
- This content is not included.BZ - 2242803
- This content is not included.BZ - 2243296
CVEs
- CVE-2023-0800
- CVE-2023-0801
- CVE-2023-0802
- CVE-2023-0803
- CVE-2023-0804
- CVE-2023-4527
- CVE-2023-4806
- CVE-2023-4813
- CVE-2023-4863
- CVE-2023-4911
- CVE-2023-5129
- CVE-2023-29406
- CVE-2023-29409
- CVE-2023-29491
- CVE-2023-39318
- CVE-2023-39319
- CVE-2023-39321
- CVE-2023-39322
- CVE-2023-39325
- CVE-2023-44487
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/security/vulnerabilities/RHSB-2023-003
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.