Red Hat Security Advisory 2023-7555-01
2023-11-29 20:48:33 Author: packetstormsecurity.com(查看原文) 阅读量:4 收藏

The following advisory data is extracted from:

https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7555.json

Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.

- Packet Storm Staff

====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift API for Data Protection (OADP) 1.3.0 security update
Advisory ID: RHSA-2023:7555-01
Product: OpenShift API for Data Protection
Advisory URL: https://access.redhat.com/errata/RHSA-2023:7555
Issue date: 2023-11-28
Revision: 01
CVE Names: CVE-2023-39325
====================================================================

Summary:

OpenShift API for Data Protection (OADP) 1.3.0 is now available.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description:

OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

Security Fix(es):

* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

* opentelemetry: DoS vulnerability in otelhttp (CVE-2023-45142)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution:

https://access.redhat.com/articles/11258

CVEs:

CVE-2023-39325

References:

https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/RHSB-2023-003
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
https://bugzilla.redhat.com/show_bug.cgi?id=2243296
https://bugzilla.redhat.com/show_bug.cgi?id=2245180
https://issues.redhat.com/browse/OADP-1167
https://issues.redhat.com/browse/OADP-2308
https://issues.redhat.com/browse/OADP-2360
https://issues.redhat.com/browse/OADP-2450
https://issues.redhat.com/browse/OADP-2607
https://issues.redhat.com/browse/OADP-2635
https://issues.redhat.com/browse/OADP-2679
https://issues.redhat.com/browse/OADP-2680
https://issues.redhat.com/browse/OADP-2681
https://issues.redhat.com/browse/OADP-2686
https://issues.redhat.com/browse/OADP-2688
https://issues.redhat.com/browse/OADP-2696
https://issues.redhat.com/browse/OADP-2717
https://issues.redhat.com/browse/OADP-2721
https://issues.redhat.com/browse/OADP-2741
https://issues.redhat.com/browse/OADP-2742
https://issues.redhat.com/browse/OADP-2774
https://issues.redhat.com/browse/OADP-2790
https://issues.redhat.com/browse/OADP-2796
https://issues.redhat.com/browse/OADP-2819
https://issues.redhat.com/browse/OADP-2856
https://issues.redhat.com/browse/OADP-2862
https://issues.redhat.com/browse/OADP-2921
https://issues.redhat.com/browse/OADP-2959
https://issues.redhat.com/browse/OADP-2981
https://issues.redhat.com/browse/OADP-2983
https://issues.redhat.com/browse/OADP-3053
https://issues.redhat.com/browse/OADP-3054
https://issues.redhat.com/browse/OADP-446


文章来源: https://packetstormsecurity.com/files/175988/RHSA-2023-7555-01.txt
如有侵权请联系:admin#unsafe.sh