Skip to content

Commit cb59ee3

Browse files
committed
OADP-2948: OADP 1.1.7 release notes
Signed-off-by: Andy Arnold <[email protected]>
1 parent 9aeeade commit cb59ee3

File tree

3 files changed

+44
-0
lines changed

3 files changed

+44
-0
lines changed

backup_and_restore/application_backup_and_restore/oadp-release-notes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ include::modules/oadp-release-notes-1-2-1.adoc[leveloffset=+1]
1515

1616
include::modules/oadp-release-notes-1-2-0.adoc[leveloffset=+1]
1717

18+
include::modules/oadp-release-notes-1-1-7.adoc[leveloffset=+1]
19+
1820
include::modules/oadp-release-notes-1-1-6.adoc[leveloffset=+1]
1921

2022
include::modules/oadp-release-notes-1-1-5.adoc[leveloffset=+1]

modules/oadp-release-notes-1-1-1.adoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,16 @@ Before you install OADP 1.1.1, it is recommended to either install VolSync 0.5.1
1515

1616
This release has the following known issues:
1717

18+
* Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
19+
+
20+
The HTTP/2 protocol is susceptible to a denial of service attack because request cancellation can reset multiple streams quickly. The server has to set up and tear down the streams while not hitting any server-side limit for the maximum number of active streams per connection. This results in a denial of service due to server resource consumption. For a list of all OADP issues associated with this CVE, see the following link:https://issues.redhat.com/browse/OADP-2868?filter=12421248[Jira list].
21+
+
22+
It is advised to upgrade to OADP 1.1.7 or 1.2.3, which resolve this issue.
23+
+
24+
For more information, see link:https://access.redhat.com/security/cve/cve-2023-39325[CVE-2023-39325 (Rapid Reset Attack)].
25+
+
26+
27+
1828
* OADP currently does not support backup and restore of AWS EFS volumes using restic in Velero (link:https://issues.redhat.com/browse/OADP-778[*OADP-778*]).
1929

2030
* CSI backups might fail due to a Ceph limitation of `VolumeSnapshotContent` snapshots per PVC.

modules/oadp-release-notes-1-1-7.adoc

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * backup_and_restore/oadp-release-notes.adoc
4+
5+
:_content-type: REFERENCE
6+
[id="migration-oadp-release-notes-1-1-7_{context}"]
7+
= OADP 1.1.7 release notes
8+
9+
The OADP 1.1.7 release notes lists any resolved issues and known issues.
10+
11+
12+
[id="resolved-issues1.1.7_{context}"]
13+
== Resolved issues
14+
15+
The following highlighted issues are resolved in OADP 1.1.7:
16+
17+
.Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
18+
19+
In previous releases of OADP 1.1, the HTTP/2 protocol was susceptible to a denial of service attack because request cancellation could reset multiple streams quickly. The server had to set up and tear down the streams while not hitting any server-side limit for the maximum number of active streams per connection. This resulted in a denial of service due to server resource consumption. For a list of all OADP issues associated with this CVE, see the following link:https://issues.redhat.com/browse/OADP-2868?filter=12421248[Jira list].
20+
21+
For more information, see link:https://access.redhat.com/security/cve/cve-2023-39325[CVE-2023-39325 (Rapid Reset Attack)].
22+
23+
For a complete list of all issues resolved in the release of OADP 1.1.7, see the list of link:https://issues.redhat.com/browse/OADP-2094?filter=12422262[OADP 1.1.7 resolved issues] in Jira.
24+
25+
26+
[id="known-issues1.1.7_{context}"]
27+
== Known issues
28+
29+
There are no known issues in the release of OADP 1.1.7.
30+
31+
32+

0 commit comments

Comments
 (0)