Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:4003 - Security Advisory
Issued:
2023-07-10
Updated:
2023-07-10

RHSA-2023:4003 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Service Interconnect 1.4 Release security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud.
A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site.

Security Fix(es):

  • golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
  • golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
  • golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
  • golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
  • golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
  • golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
  • golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
  • golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
  • golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
  • golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
  • golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Service Interconnect 1 for RHEL 9 x86_64
  • Red Hat Service Interconnect 1 for RHEL 8 x86_64

Fixes

  • BZ - 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
  • BZ - 2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers
  • BZ - 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
  • BZ - 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
  • BZ - 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
  • BZ - 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics
  • BZ - 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
  • BZ - 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
  • BZ - 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
  • BZ - 2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values
  • BZ - 2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes

CVEs

  • CVE-2022-2879
  • CVE-2022-2880
  • CVE-2022-28327
  • CVE-2022-41715
  • CVE-2022-41723
  • CVE-2022-41724
  • CVE-2022-41725
  • CVE-2023-24534
  • CVE-2023-24536
  • CVE-2023-24537
  • CVE-2023-24538
  • CVE-2023-24539
  • CVE-2023-29400

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_service_interconnect
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Service Interconnect 1 for RHEL 9

SRPM
jsoncpp-1.9.4-3.el9.src.rpm SHA-256: 4494ebb8116c97513959b0cc87a1ff1b89eb54560f0f6f4783491e331ad471b5
libwebsockets-4.3.1-1.el9ai.src.rpm SHA-256: bf467eaac4e443af4c1050bf67319e29c242b03bef32395abad97a8dc92754b5
qpid-proton-0.37.0-2.el9ai.src.rpm SHA-256: b25d7ff25161576b32e3f6980f57beb8f33e9d4ff849465d472cc47f0dbe8df2
skupper-cli-1.4.1-2.el9.src.rpm SHA-256: 5ed0cc7f340c8ebb4bb86e26edc864d4c45e90d2f1dd7813a0901252e2761af6
skupper-router-2.4.1-2.el9.src.rpm SHA-256: 0c5629116854aef1b9dc6f0d16318af949b822cd8c8a7dccfed409c315434b5e
x86_64
jsoncpp-1.9.4-3.el9.x86_64.rpm SHA-256: f1a02c1efe902a43dcbca9a1cfc9c6930d1d34c399c1ec82af0d571bcafd17ee
jsoncpp-debuginfo-1.9.4-3.el9.x86_64.rpm SHA-256: c3ae2da04e0383e1c68f679185ec8039e39c06c4bf8381006b2d1d19277d94da
jsoncpp-debugsource-1.9.4-3.el9.x86_64.rpm SHA-256: 933530cd895febc7d09f8123ad8f62aa68ff3208d495efbe2a820f68c8bd2ec5
jsoncpp-devel-1.9.4-3.el9.x86_64.rpm SHA-256: cbeb3e6ef5446275a585f9f9c152a3fa1075963be4efbec4e9a46ca221542f53
libwebsockets-4.3.1-1.el9ai.x86_64.rpm SHA-256: 586359f7ff075addb5f1e70b9f5f021a7aa6095f573061c87a27b601b78e5926
libwebsockets-debuginfo-4.3.1-1.el9ai.x86_64.rpm SHA-256: da7b1704a3322695e8c43594ee4a3f4d075c5c040d73aa6681bccac6dedc53eb
libwebsockets-debugsource-4.3.1-1.el9ai.x86_64.rpm SHA-256: 3ad832c4fe0026d10ea881a672c83e86aada7a5de765ef1f9869e2f7b74f2f18
libwebsockets-devel-4.3.1-1.el9ai.x86_64.rpm SHA-256: 54e4962411a10d52b624aacb0fde8b0f17b0045aa8fc88edb47e9b54c09dc602
python3-qpid-proton-0.37.0-2.el9ai.x86_64.rpm SHA-256: 4922a065ab6d78699beebd3b4de71e50ab1432e10c3d51dd61743b8be4d9d9fe
python3-qpid-proton-debuginfo-0.37.0-2.el9ai.x86_64.rpm SHA-256: 456a266f1a7df2e1d6900a70a080cea760b0800c9c81b83d0b9b84914a1e9f64
qpid-proton-c-0.37.0-2.el9ai.x86_64.rpm SHA-256: 2a6a678e283030f852496bd10a86c90a86b98ade1e06f6a15e0da464ab9d1411
qpid-proton-c-debuginfo-0.37.0-2.el9ai.x86_64.rpm SHA-256: 01281a12e1db80b8a9b6ce3fd2f6c5f5bcb0d87f5f822f17a2cfc35af73551a6
qpid-proton-c-devel-0.37.0-2.el9ai.x86_64.rpm SHA-256: ad1c6e9fdb2168818925164d5140ff0036062a437ca8bccfd167079102d59387
qpid-proton-cpp-0.37.0-2.el9ai.x86_64.rpm SHA-256: 5469cbade08069cdb16acffb32245354ae674d61e660bee81f1c76389d9ad628
qpid-proton-cpp-debuginfo-0.37.0-2.el9ai.x86_64.rpm SHA-256: e2e0ace1f2dfddda5261f1831ab81660403edfe3837dcb393c0b9aca2969a143
qpid-proton-cpp-devel-0.37.0-2.el9ai.x86_64.rpm SHA-256: 4810baf74c46c8f2c2824b5af06806e27a1291921ca11a0ad2454fb8ebe51f63
qpid-proton-debuginfo-0.37.0-2.el9ai.x86_64.rpm SHA-256: 569cdea00cc189c2a159901110fc368f40c419fa9b33262c0e77e4a9b0d6f737
qpid-proton-debugsource-0.37.0-2.el9ai.x86_64.rpm SHA-256: 77646370406ca29f966419d56180c741b5f079d222fc05acbe1992844b60a179
rubygem-qpid_proton-debuginfo-0.37.0-2.el9ai.x86_64.rpm SHA-256: e82db8daf0a8891a7f2ac8d828d655444d03c335c5a73bc59c34df4c36a9cd7f
skupper-cli-1.4.1-2.el9.x86_64.rpm SHA-256: 593c046f7474e5d237bfbd0ec4f70b8ca7935e02f2416e126246eb3c94c75ba6
skupper-router-2.4.1-2.el9.x86_64.rpm SHA-256: 2b584a9f6257d41158ec12a570b27ed69a65cd63aeca93dfbedbd27eaed56255
skupper-router-common-2.4.1-2.el9.noarch.rpm SHA-256: efd062d013661df2d0d3d6d94970fa188b792825f739cd688bcdc2be9b903225
skupper-router-debuginfo-2.4.1-2.el9.x86_64.rpm SHA-256: c88f87c1870bae96b1f35fef7c14a2c6c95684b03bbf311f594376e5d9e2f4f3
skupper-router-debugsource-2.4.1-2.el9.x86_64.rpm SHA-256: 1a009f88e64964a30a9450c9c5fcb0b49163dca285d4d3c9767eec93b971eecd
skupper-router-docs-2.4.1-2.el9.noarch.rpm SHA-256: 172afd4e41641f513d90bff794436635e8b6f140a1ae2db7a74df6233c4d6803
skupper-router-tools-2.4.1-2.el9.noarch.rpm SHA-256: 3788c72e442a737b4783241f09d6ae25fb11af86ed6aa120e2624b04f91a9128

Red Hat Service Interconnect 1 for RHEL 8

SRPM
libwebsockets-4.3.1-1.el8ai.src.rpm SHA-256: 0174e423ffa21adbf8afc69a9d460a5fcdd4eff0f5326d2bcb78e44aa7dfe111
qpid-proton-0.37.0-2.el8ai.src.rpm SHA-256: c5efd2d4ef5a4d05adefab3f0032edbf2c00e29c603b1c281c5cf23e27fd0f84
skupper-cli-1.4.1-2.el8.src.rpm SHA-256: 85bd5f661dbceaf10e6f4a729162a9908a52bb0f74ad39ca75106700385b35cb
skupper-router-2.4.1-2.el8.src.rpm SHA-256: f42cc91aa7738ea568d1f2350419185de62605209a9b639402671a4226142cb4
x86_64
libwebsockets-4.3.1-1.el8ai.x86_64.rpm SHA-256: 918d93ab8115214aea463890f94919b774ef0cccc6796814841187f66dd8d65f
libwebsockets-debuginfo-4.3.1-1.el8ai.x86_64.rpm SHA-256: c10b5dc3c410aa65a097f0f1b540a38741e719fd0464881d3d8b322fc120ff7e
libwebsockets-debugsource-4.3.1-1.el8ai.x86_64.rpm SHA-256: 47968fedaba90264b4f18f084c6a60eb02c647cb39c2cd51cb67c97243b4721d
libwebsockets-devel-4.3.1-1.el8ai.x86_64.rpm SHA-256: a4866bf5d9b78882ceb2f98e9a58403a533a03ee7369b01aa93c919229befcae
python3-qpid-proton-0.37.0-2.el8ai.x86_64.rpm SHA-256: 67a8c0dec97a6c9808dc263a2ea88443cc626c6b4b7f8ae7c0cc7321ad4775b5
python3-qpid-proton-debuginfo-0.37.0-2.el8ai.x86_64.rpm SHA-256: 8a92fea75acccfd9d4709ab43cd1283ad12a1a58231e61892b6736336222bb35
qpid-proton-c-0.37.0-2.el8ai.x86_64.rpm SHA-256: c88f3223510bc6fdbc05305b178082c6f1d195f92b7a3cc1427299b0174644b4
qpid-proton-c-debuginfo-0.37.0-2.el8ai.x86_64.rpm SHA-256: d796f14ed71e2fe23973495ec6c4349a8c387e32b3a94a01234ef770433c9a6e
qpid-proton-c-devel-0.37.0-2.el8ai.x86_64.rpm SHA-256: f63e2b260ad41394b3c9dfd7b72875353f78446d43c4ca6bb69ca5121d608341
qpid-proton-cpp-debuginfo-0.37.0-2.el8ai.x86_64.rpm SHA-256: 3faa7fe19ef28f08cabc3c0faf3e391306800d28f401dd3f8788e147ac4ab3bd
qpid-proton-debuginfo-0.37.0-2.el8ai.x86_64.rpm SHA-256: d8593e5b8195c5604acdc94299aab327608a4e01d83049a04e17fb6005790d0e
qpid-proton-debugsource-0.37.0-2.el8ai.x86_64.rpm SHA-256: 51a8fd5d2ba47cdf4cbe2bb58fb69de98fb7afed43dec72e5b7dcf611b06cad9
rubygem-qpid_proton-debuginfo-0.37.0-2.el8ai.x86_64.rpm SHA-256: f62493a4e4b2fd8b4e8ed5d4fd9e5fd18451579ba5de64b232bb70a45f937daa
skupper-cli-1.4.1-2.el8.x86_64.rpm SHA-256: 1e9658872fda9b7fb57e5f86b6dc04f51dd6e1d457ce053b60b4661cdf20e889
skupper-router-2.4.1-2.el8.x86_64.rpm SHA-256: 87dfd66efecc57c781b65f46df6eec772df8e41edf3146e1b48c51bd4e0330fe
skupper-router-common-2.4.1-2.el8.noarch.rpm SHA-256: b245c30e5ece10bf2431fd164ff6218ae8a682bda844ef63128fc6943c1cf47d
skupper-router-debuginfo-2.4.1-2.el8.x86_64.rpm SHA-256: 4d229a03fae3e400164c856dea5ecb1b798684001a03b43801af6d0bf467922d
skupper-router-debugsource-2.4.1-2.el8.x86_64.rpm SHA-256: 9cb6de11874752003e9fada3be697fe00d907e6db59cc2162f6f9e2b12793f0a
skupper-router-docs-2.4.1-2.el8.noarch.rpm SHA-256: e119f4005fb506c80dcbb5a64bf6e7ee13a5e5901d8976c192358f6393d4eae2
skupper-router-tools-2.4.1-2.el8.noarch.rpm SHA-256: b86bbf3ce284982e4ab86c852af561fcd9360e1f291c209774a2afd98012108a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility