[ALAS2-2024-2555] Amazon Linux 2 2017.12 - ALAS2-2024-2555: medium priority package update for cni-plugins
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2023-45288:
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/cni-plugins?arch=x86_64&distro=amazonlinux-2 | < 1.2.0-1.amzn2.0.6 |
pkg:rpm/amazonlinux/cni-plugins?arch=aarch64&distro=amazonlinux-2 | < 1.2.0-1.amzn2.0.6 |
pkg:rpm/amazonlinux/cni-plugins-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 1.2.0-1.amzn2.0.6 |
pkg:rpm/amazonlinux/cni-plugins-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 1.2.0-1.amzn2.0.6 |
- ID
- ALAS2-2024-2555
- Severity
- medium
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2555.html
- Published
-
2024-05-23T22:04:00
(3 months ago) - Modified
-
2024-05-23T22:04:00
(3 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2556
- ALAS2-2024-2568
- ALAS2-2024-2618
- ALPINE:CVE-2023-45288
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-3259
- ELSA-2024-3346
- FEDORA-2024-ce2eefc399
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- GLSA-202408-07
- GO-2024-2687
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:3259
- RHSA-2024:3346
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6886-1
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-45288 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/cni-plugins?arch=x86_64&distro=amazonlinux-2 | amazonlinux | cni-plugins | < 1.2.0-1.amzn2.0.6 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/cni-plugins?arch=aarch64&distro=amazonlinux-2 | amazonlinux | cni-plugins | < 1.2.0-1.amzn2.0.6 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/cni-plugins-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | cni-plugins-debuginfo | < 1.2.0-1.amzn2.0.6 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/cni-plugins-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | cni-plugins-debuginfo | < 1.2.0-1.amzn2.0.6 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |