Issued:
2023-11-08
Updated:
2023-11-08

RHSA-2023:6787 - Important: Network Observability security update


Synopsis

Important: Network Observability security update

Type/Severity

Security Advisory Important

Topic

An update for network-observability-console-plugin-container, network-observability-ebpf-agent-container, network-observability-flowlogs-pipeline-container, network-observability-operator-bundle-container, and network-observability-operator-container is now available for NETWORK-OBSERVABILITY-1.4.0-RHEL-9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325)

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Network Observability (NETOBSERV)1x86_64
Network Observability (NETOBSERV) for IBM Z and LinuxONE1s390x
Network Observability (NETOBSERV) for IBM Power, little endian1ppc64le
Network Observability (NETOBSERV) for ARM 641aarch64

Fixes

CVEs

References


Additional information