7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.732 High
EPSS
Percentile
98.1%
This release of RHACS 3.74.7 includes fixes for the following security
vulnerabilities:
golang: net/http, x/net/http2: rapid stream resets can cause excessive
work
(CVE-2023-39325)
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS
attack
(Rapid Reset Attack) (CVE-2023-44487)
Various CVEs in containers for glibc security issues
A Red Hat Security Bulletin which addresses further details about this flaw
is
available in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
RHACS 3.74.7 includes a new default policy called “Rapid Reset: Denial of
Service
Vulnerability in HTTP/2 Protocol”. This policy alerts on deployments with
images
containing components that are susceptible to a Denial of Service (DoS)
vulnerability for HTTP/2 servers, based on CVE-2023-44487 and
CVE-2023-39325.
This policy applies to the build or deploy life cycle stage.