RedHat: RHSA-2023-1079:01 Moderate: Red Hat OpenStack Platform 16.2
Summary
Security Fix(es):
* archive/tar: unbounded memory consumption when reading headers(CVE-2022-2879)
* regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* net/http: An attacker can cause excessive memory growth in a Go server
accepting HTTP/2 requests (CVE-2022-41717)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Summary
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2021-46848 https://access.redhat.com/security/cve/CVE-2022-2879 https://access.redhat.com/security/cve/CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-35737 https://access.redhat.com/security/cve/CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 https://access.redhat.com/security/cve/CVE-2022-41715 https://access.redhat.com/security/cve/CVE-2022-41717 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#moderate
Package List
Topic
An update for osp-director-downloader-container,osp-director-agent-container and osp-director-operator-container is nowavailable for Red Hat OpenStack Platform 16.2 (Train).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Bugs Fixed
2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests
5. JIRA issues fixed (https://issues.redhat.com/):
OSPK8-664 - Unexpected "unassigned" hostRefs in OSBMS halt further reconcile loops