First published: Wed Nov 08 2023(Updated: )
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.<br>This advisory contains OpenShift Virtualization 4.14.0 images.<br>Security Fix(es):<br><li> golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)</li> <li> HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)</li> <li> mongo-go-driver: specific cstrings input may not be properly validated (CVE-2021-20329)</li> <li> golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)</li> <li> golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)</li> <li> containerd: OCI image importer memory exhaustion (CVE-2023-25153)</li> <li> containerd: Supplementary groups are not set up properly (CVE-2023-25173)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Virtualization |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:6817 is considered important due to the potential exploitation of vulnerabilities in OpenShift Virtualization.
To fix RHSA-2023:6817, update to the OpenShift Virtualization 4.14.0 images as recommended in the advisory.
RHSA-2023:6817 affects the OpenShift Virtualization component within the Red Hat OpenShift Container Platform.
RHSA-2023:6817 addresses vulnerabilities related to rapid stream resets in the net/http and x/net/http2 packages.
Yes, applying the updates from RHSA-2023:6817 is recommended to ensure the security and stability of your OpenShift Virtualization deployment.