Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3155-1

Опубликовано: 06 сент. 2024
Источник: suse-cvrf

Описание

Security update for kubernetes1.26

This update for kubernetes1.26 fixes the following issues:

  • CVE-2023-45288: Close connections when receiving too many headers. (bsc#1229869)

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise Module for Containers 15 SP5
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise Module for Containers 15 SP6
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise Server 15 SP4-LTSS
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
openSUSE Leap 15.5
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
openSUSE Leap 15.6
kubernetes1.26-apiserver-1.26.15-150400.9.14.1
kubernetes1.26-client-1.26.15-150400.9.14.1
kubernetes1.26-client-bash-completion-1.26.15-150400.9.14.1
kubernetes1.26-client-common-1.26.15-150400.9.14.1
kubernetes1.26-client-fish-completion-1.26.15-150400.9.14.1
kubernetes1.26-controller-manager-1.26.15-150400.9.14.1
kubernetes1.26-kubeadm-1.26.15-150400.9.14.1
kubernetes1.26-kubelet-1.26.15-150400.9.14.1
kubernetes1.26-kubelet-common-1.26.15-150400.9.14.1
kubernetes1.26-proxy-1.26.15-150400.9.14.1
kubernetes1.26-scheduler-1.26.15-150400.9.14.1

Описание

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.14.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.14.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.14.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.14.1

Ссылки
Уязвимость SUSE-SU-2024:3155-1