Lucene search

K
redhatRedHatRHSA-2023:6085
HistoryOct 24, 2023 - 3:31 p.m.

(RHSA-2023:6085) Important: Red Hat OpenShift distributed tracing security update

2023-10-2415:31:15
access.redhat.com
25
red hat openshift
distributed tracing
security update
golang
http/2
ddos attack
cve-2023
cvss score
acknowledgments
references
vulnerabilities

0.72 High

EPSS

Percentile

98.0%

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

  • golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)

  • golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)

  • golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)

  • golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)

  • golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)

  • golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.