Important: Kernel Module Management security update

Synopsis

Important: Kernel Module Management security update

Type/Severity

Security Advisory: Important

Topic

This is an update for the Red Hat OpenShift Kernel Module Management 1.1 operator and images to address CVE-2023-44487 which Red Hat has assessed as being Important (sees https://access.redhat.com/security/cve/CVE-2023-44487 for details)

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

It releases an updated versions of the Kernel Module Management bringing it to v1.1.2
As part of this it updates the following container images that constitute the Kernel Module Management Operator:
kernel-module-management-signing
kernel-module-management-operator
kernel-module-management-worker
kernel-module-management-hub-operator
kernel-module-management-must-gather
kernel-module-management-hub-operator-bundle
kernel-module-management-operator-bundle

Description

kernel module management is Red Hat's operator designed to load and manage out-of-tree kernel modules and device plugins for Red Hat OpenShift Container Platform.

This advisory contains kernel module management 1.1.2 images to address CVE-2023-44487

Security Fix(es):

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Kernel Module Management 1 for RHEL 9 x86_64

Fixes

  • BZ - 2242803 - CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)