Skip to content

Commit 43b9507

Browse files
committed
MIG-1475: Release notes for MTC 1.7.14
Signed-off-by: Andy Arnold <[email protected]>
1 parent ede2de4 commit 43b9507

File tree

2 files changed

+50
-0
lines changed

2 files changed

+50
-0
lines changed

migration_toolkit_for_containers/mtc-release-notes.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ You can migrate from xref:../migrating_from_ocp_3_to_4/about-migrating-from-3-to
1818
For information on the support policy for {mtc-short}, see link:https://access.redhat.com/support/policy/updates/openshift#app_migration[OpenShift Application and Cluster Migration Solutions], part of the _Red Hat {product-title} Life Cycle Policy_.
1919

2020
include::modules/migration-mtc-release-notes-1-8.adoc[leveloffset=+1]
21+
include::modules/migration-mtc-release-notes-1-7-14.adoc[leveloffset=+1]
2122
include::modules/migration-mtc-release-notes-1-7-13.adoc[leveloffset=+1]
2223
include::modules/migration-mtc-release-notes-1-7-12.adoc[leveloffset=+1]
2324
include::modules/migration-mtc-release-notes-1-7-11.adoc[leveloffset=+1]
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * migration_toolkit_for_containers/mtc-release-notes.adoc
4+
:_content-type: REFERENCE
5+
[id="migration-mtc-release-notes-1-7-14_{context}"]
6+
= {mtc-full} 1.7.14 release notes
7+
8+
[id="resolved-issues-1-7-14_{context}"]
9+
== Resolved issues
10+
11+
This release has the following resolved issues:
12+
13+
.CVE-2023-39325 CVE-2023-44487: various flaws
14+
15+
A flaw was found in the handling of multiplexed streams in the HTTP/2 protocol, which is utilized by {mtc-full} ({mtc-short}). A client could repeatedly make a request for a new multiplex stream then immediately send an `RST_STREAM` frame to cancel those requests. This activity created additional workloads for the server in terms of setting up and dismantling streams, but avoided any server-side limitations on the maximum number of active streams per connection. As a result, a denial of service occurred due to server resource consumption.
16+
17+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2243564[(BZ#2243564)]
18+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244013[(BZ#2244013)]
19+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244014[(BZ#2244014)]
20+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244015[(BZ#2244015)]
21+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244016[(BZ#2244016)]
22+
* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244017[(BZ#2244017)]
23+
24+
To resolve this issue, upgrade to {mtc-short} 1.7.14.
25+
26+
For more details, see link:https://access.redhat.com/security/cve/cve-2023-44487[(CVE-2023-44487)] and link:https://access.redhat.com/security/cve/cve-2023-39325[(CVE-2023-39325)].
27+
28+
.CVE-2023-39318 CVE-2023-39319 CVE-2023-39321: various flaws
29+
30+
* link:https://access.redhat.com/security/cve/cve-2023-39318[(CVE-2023-39318)]: A flaw was discovered in Golang, utilized by {mtc-short}. The `html/template` package did not properly handle HTML-like `""` comment tokens, or the hashbang `"#!"` comment tokens, in `<script>` contexts. This flaw could cause the template parser to improperly interpret the contents of `<script>` contexts, causing actions to be improperly escaped.
31+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)]  
32+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)]
33+
* link:https://access.redhat.com/security/cve/cve-2023-39319[(CVE-2023-39319)]: A flaw was discovered in Golang, utilized by {mtc-short}. The `html/template` package did not apply the proper rules for handling occurrences of `"<script"`, `"<!--"`, and `"</script"` within JavaScript literals in <script> contexts. This could cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. 
34+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)]  
35+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)]
36+
* link:https://access.redhat.com/security/cve/cve-2023-39321[(CVE-2023-39321)]: A flaw was discovered in Golang, utilized by {mtc-short}. Processing an incomplete post-handshake message for a QUIC connection could cause a panic.
37+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)]  
38+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)]
39+
* link:https://access.redhat.com/security/cve/cve-2023-39322[(CVE-2023-3932)]: A flaw was discovered in Golang, utilized by {mtc-short}. Connections using the QUIC transport protocol did not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. 
40+
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)]
41+
42+
To resolve these issues, upgrade to {mtc-short} 1.7.14.
43+
44+
For more details, see link:https://access.redhat.com/security/cve/cve-2023-39318[(CVE-2023-39318)], link:https://access.redhat.com/security/cve/cve-2023-39319[(CVE-2023-39319)], and link:https://access.redhat.com/security/cve/cve-2023-39321[(CVE-2023-39321)].
45+
46+
[id="known-issues-1-7-14_{context}"]
47+
== Known issues
48+
49+
There are no major known issues in this release.

0 commit comments

Comments
 (0)