First published: Mon Oct 23 2023(Updated: )
An update is now available for Cryostat 2 on RHEL 8.<br>Security Fix(es):<br><li> golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)</li> <li> HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)</li> <li> golang.org/x/net/html: Cross site scripting (CVE-2023-3978)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> insufficient sanitization of Host header (CVE-2023-29406)</li> <li> golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)</li> <li> golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)</li> <li> golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Cryostat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:6031 is high.
The affected software of RHSA-2023:6031 is Red Hat Cryostat.
To fix RHSA-2023:6031, you should apply the provided security update for Cryostat.
You can find more information about RHSA-2023:6031 on the following Bugzilla links: [Link 1](https://bugzilla.redhat.com/show_bug.cgi?id=2222167), [Link 2](https://bugzilla.redhat.com/show_bug.cgi?id=2228689), [Link 3](https://bugzilla.redhat.com/show_bug.cgi?id=2228743).