First published: Mon Nov 06 2023(Updated: )
Migration Toolkit for Applications 6.1.4 Images.<br>Security Fix(es):<br><li> golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)</li> <li> HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Migration Toolkit for Applications |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:6305 is classified as important due to vulnerabilities that can lead to Denial of Service attacks.
To fix RHSA-2023:6305, update the Migration Toolkit for Applications to version 6.1.4 or later.
RHSA-2023:6305 addresses CVE-2023-44487 and CVE-2023-39325 related to excessive work from rapid stream resets in HTTP/2.
RHSA-2023:6305 affects systems running the Migration Toolkit for Applications 6.1.4.
Yes, RHSA-2023:6305 presents a risk of Denial of Service due to vulnerabilities in multiple HTTP/2 enabled web servers.