First published: Mon Jun 19 2023(Updated: )
Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go</li> server accepting HTTP/2 requests (CVE-2022-41717)<br><li> golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)</li> <li> golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)</li> <li> golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> improper sanitization of Transfer-Encoding header (CVE-2022-1705)</li> <li> golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:3664 is classified as a moderate severity vulnerability on affected systems.
The recommended fix for RHSA-2023:3664 is to update the OpenShift Jenkins image and Jenkins agent base image to the latest version provided by the security advisory.
RHSA-2023:3664 addresses CVE-2022-41717, which involves excessive memory growth in a Go server handling HTTP/2 requests.
Users of affected OpenShift Jenkins images and Jenkins agent base images are at risk due to RHSA-2023:3664.
Monitor your systems for unusual memory consumption patterns or performance degradation that may indicate exploitation of CVE-2022-41717.