First published: Wed Nov 01 2023(Updated: )
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.<br>This advisory contains OpenShift Virtualization 4.13.5 images.<br>Security Fix(es):<br><li> golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)</li> <li> HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)</li> <li> net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [4.13] portworx: update the storageProfile (BZ#2237872)</li> <li> kubevirt_vmi_phase_count metrics is not working in 4.13.5 (BZ#2240675)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Virtualization |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:6235 is not explicitly stated, but it addresses significant security concerns in OpenShift Virtualization.
To fix RHSA-2023:6235, you should update to the latest OpenShift Virtualization 4.13.5 images as recommended in the advisory.
RHSA-2023:6235 addresses vulnerabilities related to rapid stream resets in the net/http and x/net/http2 packages.
RHSA-2023:6235 specifically applies to OpenShift Virtualization 4.13.5 and may not affect other versions.
More information about RHSA-2023:6235 can be found in the Red Hat advisory and associated security bug reports.