Lucene search

K
redhatRedHatRHSA-2023:6071
HistoryOct 24, 2023 - 9:39 a.m.

(RHSA-2023:6071) Important: RHACS 4.0 enhancement and security update

2023-10-2409:39:19
access.redhat.com
21
rhacs 4.0.5
security update
http/2
ddos vulnerabilities
golang
http/2 servers
rapid reset attack
cve-2023-39325
cve-2023-44487
default policy

0.732 High

EPSS

Percentile

98.1%

This release of RHACS 4.0.5 includes fixes for the following security
vulnerabilities:

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work
    (CVE-2023-39325)

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack
    (Rapid Reset Attack) (CVE-2023-44487)

  • Various CVEs in containers for glibc security issues

A Red Hat Security Bulletin which addresses further details about this flaw is
available in the References section.

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

RHACS 4.0.5 includes a new default policy called “Rapid Reset: Denial of Service
Vulnerability in HTTP/2 Protocol”. This policy alerts on deployments with images
containing components that are susceptible to a Denial of Service (DoS)
vulnerability for HTTP/2 servers, based on CVE-2023-44487 and CVE-2023-39325.
This policy applies to the build or deploy life cycle stage.