|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * migration_toolkit_for_containers/mtc-release-notes.adoc |
| 4 | +:_content-type: REFERENCE |
| 5 | +[id="migration-mtc-release-notes-1-7-14_{context}"] |
| 6 | += {mtc-full} 1.7.14 release notes |
| 7 | + |
| 8 | +[id="resolved-issues-1-7-14_{context}"] |
| 9 | +== Resolved issues |
| 10 | + |
| 11 | +This release has the following resolved issues: |
| 12 | + |
| 13 | +.CVE-2023-39325 CVE-2023-44487: various flaws |
| 14 | + |
| 15 | +A flaw was found in the handling of multiplexed streams in the HTTP/2 protocol, which is utilized by {mtc-full} ({mtc-short}). A client could repeatedly make a request for a new multiplex stream then immediately send an `RST_STREAM` frame to cancel those requests. This activity created additional workloads for the server in terms of setting up and dismantling streams, but avoided any server-side limitations on the maximum number of active streams per connection. As a result, a denial of service occurred due to server resource consumption. |
| 16 | + |
| 17 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2243564[(BZ#2243564)] |
| 18 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244013[(BZ#2244013)] |
| 19 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244014[(BZ#2244014)] |
| 20 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244015[(BZ#2244015)] |
| 21 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244016[(BZ#2244016)] |
| 22 | +* link:https://bugzilla.redhat.com/show_bug.cgi?id=2244017[(BZ#2244017)] |
| 23 | + |
| 24 | +To resolve this issue, upgrade to {mtc-short} 1.7.14. |
| 25 | + |
| 26 | +For more details, see link:https://access.redhat.com/security/cve/cve-2023-44487[(CVE-2023-44487)] and link:https://access.redhat.com/security/cve/cve-2023-39325[(CVE-2023-39325)]. |
| 27 | + |
| 28 | +.CVE-2023-39318 CVE-2023-39319 CVE-2023-39321: various flaws |
| 29 | + |
| 30 | +* link:https://access.redhat.com/security/cve/cve-2023-39318[(CVE-2023-39318)]: A flaw was discovered in Golang, utilized by {mtc-short}. The `html/template` package did not properly handle HTML-like `""` comment tokens, or the hashbang `"#!"` comment tokens, in `<script>` contexts. This flaw could cause the template parser to improperly interpret the contents of `<script>` contexts, causing actions to be improperly escaped. |
| 31 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)] |
| 32 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)] |
| 33 | +* link:https://access.redhat.com/security/cve/cve-2023-39319[(CVE-2023-39319)]: A flaw was discovered in Golang, utilized by {mtc-short}. The `html/template` package did not apply the proper rules for handling occurrences of `"<script"`, `"<!--"`, and `"</script"` within JavaScript literals in <script> contexts. This could cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. |
| 34 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)] |
| 35 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)] |
| 36 | +* link:https://access.redhat.com/security/cve/cve-2023-39321[(CVE-2023-39321)]: A flaw was discovered in Golang, utilized by {mtc-short}. Processing an incomplete post-handshake message for a QUIC connection could cause a panic. |
| 37 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238062[(BZ#2238062)] |
| 38 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)] |
| 39 | +* link:https://access.redhat.com/security/cve/cve-2023-39322[(CVE-2023-3932)]: A flaw was discovered in Golang, utilized by {mtc-short}. Connections using the QUIC transport protocol did not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. |
| 40 | +** link:https://bugzilla.redhat.com/show_bug.cgi?id=2238088[(BZ#2238088)] |
| 41 | + |
| 42 | +To resolve these issues, upgrade to {mtc-short} 1.7.14. |
| 43 | + |
| 44 | +For more details, see link:https://access.redhat.com/security/cve/cve-2023-39318[(CVE-2023-39318)], link:https://access.redhat.com/security/cve/cve-2023-39319[(CVE-2023-39319)], and link:https://access.redhat.com/security/cve/cve-2023-39321[(CVE-2023-39321)]. |
| 45 | + |
| 46 | +[id="known-issues-1-7-14_{context}"] |
| 47 | +== Known issues |
| 48 | + |
| 49 | +There are no major known issues in this release. |
0 commit comments