This release of RHACS 4.0.5 includes fixes for the following security
vulnerabilities:
golang: net/http, x/net/http2: rapid stream resets can cause excessive work
(CVE-2023-39325)
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack
(Rapid Reset Attack) (CVE-2023-44487)
Various CVEs in containers for glibc security issues
A Red Hat Security Bulletin which addresses further details about this flaw is
available in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
RHACS 4.0.5 includes a new default policy called “Rapid Reset: Denial of Service
Vulnerability in HTTP/2 Protocol”. This policy alerts on deployments with images
containing components that are susceptible to a Denial of Service (DoS)
vulnerability for HTTP/2 servers, based on CVE-2023-44487 and CVE-2023-39325.
This policy applies to the build or deploy life cycle stage.