-
Bug
-
Resolution: Done
-
Critical
-
7.13.1.GA
-
False
-
None
-
False
-
-
-
-
-
-
CR1
-
---
-
---
-
-
-
2024 Week 7-9 (from Feb 12)
Security Tracking Issue
Do not make this issue public.
Impact: Major Incident
Reported Date: 09-Oct-2023
Resolve Bug By: 17-Oct-2023
In case the dates above are already past, please evaluate this bug in your next prioritization review and make a decision then.
Please see the Security Errata Policy for further details: https://docs.engineering.redhat.com/x/9kKpDw
Flaw:
CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
- is blocked by
-
JBEAP-25457 (7.4.z) Upgrade Undertow from 2.2.26.SP1-redhat-00001 to 2.2.28.SP1
- Closed
- is incorporated by
-
RHPAM-4821 [One-Off patch][Major Incident] CVE-2023-44487 HTTP/2 DDOS Vulnerability
- Closed
- links to
-
RHSA-2023:122985 Updated Red Hat Process Automation Manager 7.13.4 SP2 Images
-
RHSA-2023:123796 Updated IBM Business Automation Manager Open Editions 8.0.4 Images
-
RHSA-2024:129123 Red Hat Process Automation Manager 7.13.4 SP2 security one-off update