Lucene search

K
redhatRedHatRHSA-2023:6122
HistoryOct 25, 2023 - 4:31 p.m.

(RHSA-2023:6122) Important: Red Hat Advanced Cluster Management 2.8.3 security and bug fix updates

2023-10-2516:31:39
access.redhat.com
15
red hat
kubernetes
security
bug fix
clusters
cloud environments
rapid reset attack
ddos attack
cvss score
cve page
golang
net/http
x/net/http2
html/template
crypto/tls
quic connections
release notes

0.732 High

EPSS

Percentile

98.1%

Red Hat Advanced Cluster Management for Kubernetes 2.8.3 images

Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which address security issues and fix several bugs. See the Release Notes link in the References section, which will be updated shortly, for additional details about this release.

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.

  • golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)

  • golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)

  • golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)

  • golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.