Important: Network Observability security update

Related Vulnerabilities: CVE-2023-39325   CVE-2023-44487  

Synopsis

Important: Network Observability security update

Type/Severity

Security Advisory: Important

Topic

An update for network-observability-console-plugin-container,
network-observability-ebpf-agent-container,
network-observability-flowlogs-pipeline-container,
network-observability-operator-bundle-container, and
network-observability-operator-container is now available for
NETWORK-OBSERVABILITY-1.4.0-RHEL-9.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work

(CVE-2023-39325)

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack

(Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Network Observability (NETOBSERV) 1 for RHEL 9 x86_64
  • Network Observability (NETOBSERV) for ARM 64 1 for RHEL 9 aarch64
  • Network Observability (NETOBSERV) for IBM Power, little endian 1 for RHEL 9 ppc64le
  • Network Observability (NETOBSERV) for IBM Z and LinuxONE 1 for RHEL 9 s390x

Fixes

  • BZ - 2242803 - CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
  • BZ - 2243296 - CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)